Under Attack? Contact Us
Reading Time: < 1 minutes CDG's technical response to the Log4j2 exploit: who is affected...
Reading Time: < 1 minutes What a IT risk assessment is, what different types of...
Reading Time: < 1 minutes An Incident Response Team monitors and mitigates all IR activities...
Reading Time: < 1 minutes CDG's general council breaks down CCPA requirements and how you...
Reading Time: < 1 minutes CDG's technical response to the Log4j2 exploit: who is affected and how to remediate.
Reading Time: < 1 minutes What a IT risk assessment is, what different types of assessments exist, and how to ensure an assessment is effective...
Reading Time: < 1 minutes An Incident Response Team monitors and mitigates all IR activities across an organization and can be the difference between business...
Reading Time: < 1 minutes CDG's general council breaks down CCPA requirements and how you can ensure your organization is compliant.
Reading Time: < 1 minutes Why it is important to build security into products and development rather than tacking it on when needed.
Reading Time: < 1 minutes What are containers and why container security is vitally important to your development and operations.
Reading Time: < 1 minutes What to look for and the questions to ask when hiring an external cybersecurity team.
Reading Time: < 1 minutes Cybersecurity lessons learned and forecast in the wake of Zoom's security fallout at the beginning of the Covid-19 shut down.
Reading Time: < 1 minutes What is Cyber-Threat Modeling? Methodologies, best practices and next steps to adopting a proactive security posture.
Reading Time: < 1 minutes Senior Technical Program Mngr gives comprehensive advice and resources to help loved ones protect elders from hackers and scammers.
Reading Time: < 1 minutes 4 Steps to maximize value on your cybersecurity tools and relieve vendor overload.
Reading Time: < 1 minutes CDG's disects lessons learned after the SolarWinds breach and how enterpise organizations can impove their cybersecuity postures.
Reading Time: < 1 minutes A technical breakdown of how to create a cybersecurity alert framework to keep cybersecurity teams focused during an incident.
Reading Time: < 1 minutes What is DevSecOps and why it is becoming more and more critical to build cybersecurity in at your development stage.
Reading Time: < 1 minutes Endpoint security concerns monitoring, protection, and restriciton of endpoints - How do you secure them and why is it important?
Reading Time: < 1 minutes Covid's overwhelm on the heathcare industry and the unprecedented need for telehealth created a interwoven relationship between HIPAA and cloud...
Reading Time: < 1 minutes The importance of cloud computing to modern organizations, why it is cost-effective and the better for data security and protection.
Reading Time: < 1 minutes Why ransomware ran rampant across the healthcare industry at the beginning of the Covid-19 pandemic.
Reading Time: < 1 minutes The why, what, how, how often and how much of Cyber Risk Assessments.
Reading Time: < 1 minutes New individual state privacy regulations in 2023 can be a confusing and daunting landscape to maneuver. Cyber Defense Group sheds...
Reading Time: < 1 minutes Why paying ransomware ransoms is detremental to all organizations and best practices if you experience a ransomware incident.
Reading Time: < 1 minutes A cybersecurity awareness culture should not be an afterthought reserved for Cybersecurity Awareness Month in October. Here's how to create...
Reading Time: < 1 minutes CDG CEO Lou Rabon's advice to organizations to help understand and recover from the SolarWinds breach. Video included.
Reading Time: < 1 minutes CDG reacts to the "Shields Up" cyber defense alert in the days following Russia's invasion of Ukraine giving general and...
Reading Time: < 1 minutes The number of breaches and dollars lost skyrockets every year. Good cyber hygiene, awareness, and monitoring should not be reserved...
Reading Time: < 1 minutes Here's a list of mistakes organization are making that leave CISOs frustrated and ineffective and what they could do instead.
Reading Time: < 1 minutes CDG's Incident Response pros guide to creating an emergency IR procedure.
Reading Time: < 1 minutes 1st Segment of CDGs engineering team's news and insights:
Reading Time: < 1 minutes The Top 5 Reasons Investing in Cybersecurity is Best Practice for Businesses
Reading Time: < 1 minutes Soc-2 and ISO 27001 are two of the most common cybersecurity compliance audit options. What do they entail, what is...
Reading Time: < 1 minutes After a very busy season of working overtime to respond to emergency incident responses, CEO Lou Rabon gives his two...
Reading Time: < 1 minutes The best way to stop hackers is to think like them. How CDG's hacker mentality gives us the creative edge...
Reading Time: < 1 minutes What is a cybersecurity assessment? What does it entail? Learn how Cyber Defense Group's team of humans will guide you...
Reading Time: < 1 minutes CDG Sr. Technical Program Manager gives her advice on how employee personal devices affect organizations' cybersecurity postures and how to...
Reading Time: < 1 minutes Engineering corner - Dir of Engineering discusses why monitoring from the outside in is critically important: "If you can see...
Reading Time: < 1 minutes The cybersecurity employment gap, the challenges facing women in cybersecurity, cybersecurity job misconceptions, and the underestimation of women's tech saavy...
Reading Time: < 1 minutes What are ransomware attacks, why are they such a looming threat to organizations of every size, and how to approach...
Reading Time: < 1 minutes What a cybersecurity risk assessment is, why your organization should invest in one, and the factors that calculate the return...
Reading Time: < 1 minutes Covid-19's stay at home culture created a rushed increase in cloud computing and eCommerce. Why a bigger digital economy calls...
Reading Time: < 1 minutes CDG's list of seven threats to organizations working in the cloud and how best to mitigate them.
Reading Time: < 1 minutes CDG's open letter at the beginning of the Covid 19 shutdown on cybersecurity best practices for organizations forced to move...
Reading Time: < 1 minutes Why trust, team building, and human relations are vital to proactive cybersecurity.
Reading Time: < 1 minutes Why it is critical to catch a cyber breach ASAP, the indicators your team should be on the alert for,...
Reading Time: < 1 minutes What is a third-party - vendor-risk - assessment, how are they done, and does your organization need to invest in...
Reading Time: < 1 minutes The California Privacy Rights Act's January 2023 compliance deadline is almost here. Are you confident you are CPRA compliant? We...
Reading Time: < 1 minutes What is the California Privacy Rights Act, how does it differ from the California Consumer Protection Act, and how to...
Reading Time: < 1 minutes What is "Incident Response"? Why is it important, how does it work, how to assemble your Incident Response Team and...
Reading Time: < 1 minutes Today just about every organization is a cloud-reliant organization and cybersecurity can be vital to success. Here's how to create...
Reading Time: < 1 minutes In 2016, frustrated with the outdated, template-driven approach to cybersecurity, I was inspired to create a different kind of cybersecurity...
Reading Time: < 1 minutes CDG's expert cybersecurity advice in reaction to Zoom security issues when they were happening early on during the Covid-19 shutdown.
Copyright © 2023 Cyber Defense Group. All Rights Reserved