Under Attack? Contact Us

Blogs

Philip Gavlan

RCE 0-day exploit found in log4j2

Reading Time: < 1 minutes CDG's technical response to the Log4j2 exploit: who is affected...

Dec 10, 2021
CDG

8 Steps for a Successful Security Risk Assessment

Reading Time: < 1 minutes What a IT risk assessment is, what different types of...

May 09, 2022
CDG

Building an Incident Response Team & IR Process

Reading Time: < 1 minutes An Incident Response Team monitors and mitigates all IR activities...

Apr 30, 2020
CDG

What are CCPA Regulations?

Reading Time: < 1 minutes CDG's general council breaks down CCPA requirements and how you...

Jul 16, 2020
Philip Gavlan

RCE 0-day exploit found in log4j2

Reading Time: < 1 minutes CDG's technical response to the Log4j2 exploit: who is affected and how to remediate.

Dec 10, 2021
CDG

8 Steps for a Successful Security Risk Assessment

Reading Time: < 1 minutes What a IT risk assessment is, what different types of assessments exist, and how to ensure an assessment is effective...

May 09, 2022
CDG

Building an Incident Response Team & IR Process

Reading Time: < 1 minutes An Incident Response Team monitors and mitigates all IR activities across an organization and can be the difference between business...

Apr 30, 2020
CDG

What are CCPA Regulations?

Reading Time: < 1 minutes CDG's general council breaks down CCPA requirements and how you can ensure your organization is compliant.

Jul 16, 2020
Lou Rabon

Committing to Security Pre-Product

Reading Time: < 1 minutes Why it is important to build security into products and development rather than tacking it on when needed.

Aug 11, 2021
CDG

Container Security

Reading Time: < 1 minutes What are containers and why container security is vitally important to your development and operations.

Jul 21, 2020
Lou Rabon

Cyber Attack Prevention Starts With Finding The Right Team

Reading Time: < 1 minutes What to look for and the questions to ask when hiring an external cybersecurity team.

Sep 28, 2021
Lou Rabon

Fallout 2020 – The Impact of Cyber Debt to Agile Organizations

Reading Time: < 1 minutes Cybersecurity lessons learned and forecast in the wake of Zoom's security fallout at the beginning of the Covid-19 shut down.

Apr 24, 2020
CDG

Cyber Threat-Modeling: A Proactive Step in Prevention

Reading Time: < 1 minutes What is Cyber-Threat Modeling? Methodologies, best practices and next steps to adopting a proactive security posture.

Sep 14, 2021
Caroline Connolly

Cybersecurity Best Practices To Prevent Elder Scams

Reading Time: < 1 minutes Senior Technical Program Mngr gives comprehensive advice and resources to help loved ones protect elders from hackers and scammers.

Apr 22, 2022
Lou Rabon

How To Save Costs And Maximize Value On Cybersecurity Tools

Reading Time: < 1 minutes 4 Steps to maximize value on your cybersecurity tools and relieve vendor overload.

Aug 11, 2020
Lou Rabon

Top 5 Reasons Why the Enterprise is Getting Cybersecurity Wrong

Reading Time: < 1 minutes CDG's disects lessons learned after the SolarWinds breach and how enterpise organizations can impove their cybersecuity postures.

Jan 07, 2021
CDG

Decision-Driven Cybersecurity Alert Framework

Reading Time: < 1 minutes A technical breakdown of how to create a cybersecurity alert framework to keep cybersecurity teams focused during an incident.

Apr 16, 2020
CDG

Defining DevSecOps And Applying Its Best Practices

Reading Time: < 1 minutes What is DevSecOps and why it is becoming more and more critical to build cybersecurity in at your development stage.

Jul 24, 2020
CDG

What is Endpoint Security?

Reading Time: < 1 minutes Endpoint security concerns monitoring, protection, and restriciton of endpoints - How do you secure them and why is it important?

Jul 09, 2020
CDG

HIPAA Compliance and Cloud Compliance Continue to Have a Growing Relationship

Reading Time: < 1 minutes Covid's overwhelm on the heathcare industry and the unprecedented need for telehealth created a interwoven relationship between HIPAA and cloud...

Jun 22, 2021
CDG

How Cloud Computing Saves You Money and Gives You Peace of Mind

Reading Time: < 1 minutes The importance of cloud computing to modern organizations, why it is cost-effective and the better for data security and protection.

Mar 24, 2021
Lou Rabon

How COVID and Ransomware Have Affected Healthcare Cybersecurity

Reading Time: < 1 minutes Why ransomware ran rampant across the healthcare industry at the beginning of the Covid-19 pandemic.

Dec 04, 2020
CDG

How Often Does a Business Need a Cybersecurity Risk Assessment?

Reading Time: < 1 minutes The why, what, how, how often and how much of Cyber Risk Assessments.

Oct 27, 2021
CDG

How to Deal With – and Avoid – Ransomware Incidents

Reading Time: < 1 minutes Why paying ransomware ransoms is detremental to all organizations and best practices if you experience a ransomware incident.

Apr 10, 2020
Caroline Connolly

How To Implement a Successful Cybersecurity Awareness Program

Reading Time: < 1 minutes A cybersecurity awareness culture should not be an afterthought reserved for Cybersecurity Awareness Month in October. Here's how to create...

Oct 07, 2022
Lou Rabon

How to Make Sense of the SolarWinds Hack

Reading Time: < 1 minutes CDG CEO Lou Rabon's advice to organizations to help understand and recover from the SolarWinds breach. Video included.

Dec 17, 2021
Lou Rabon

Immediate Steps to Take During This Time of Increased Cyber Activity

Reading Time: < 1 minutes CDG reacts to the "Shields Up" cyber defense alert in the days following Russia's invasion of Ukraine giving general and...

Mar 17, 2022
CDG

Why Your Business Needs to Treat Every Month Like Cybersecurity Awareness Month

Reading Time: < 1 minutes The number of breaches and dollars lost skyrockets every year. Good cyber hygiene, awareness, and monitoring should not be reserved...

Oct 14, 2021
Lou Rabon

Why Your CISO is Ineffective and What You Can do About it

Reading Time: < 1 minutes Here's a list of mistakes organization are making that leave CISOs frustrated and ineffective and what they could do instead.

May 19, 2020
CDG

Initial Incident Response Procedure – The Six Critical Steps To Take

Reading Time: < 1 minutes CDG's Incident Response pros guide to creating an emergency IR procedure.

Apr 28, 2020
Philip Gavlan

Introducing Cyber Defense Group’s Engineering Tech Corner

Reading Time: < 1 minutes 1st Segment of CDGs engineering team's news and insights:

Mar 22, 2022
CDG

Cyber Defense Group’s August Reading Suggestions

Reading Time: < 1 minutes

Aug 05, 2020
Lou Rabon

Save Your Business and Invest in Cybersecurity

Reading Time: < 1 minutes The Top 5 Reasons Investing in Cybersecurity is Best Practice for Businesses

May 18, 2021
CDG

SOC-2 and ISO 27001 Compliance and Cybersecurity

Reading Time: < 1 minutes Soc-2 and ISO 27001 are two of the most common cybersecurity compliance audit options. What do they entail, what is...

Jun 08, 2021
CDG

The Era of Faking Security is Over

Reading Time: < 1 minutes After a very busy season of working overtime to respond to emergency incident responses, CEO Lou Rabon gives his two...

May 26, 2021
Lou Rabon

The Hacker Mentality We Hold

Reading Time: < 1 minutes The best way to stop hackers is to think like them. How CDG's hacker mentality gives us the creative edge...

Aug 24, 2021
J.J. Powell

The Holistic Cybersecurity Assessment: A Cyber Defense Group Differentiator

Reading Time: < 1 minutes What is a cybersecurity assessment? What does it entail? Learn how Cyber Defense Group's team of humans will guide you...

Sep 30, 2022
Caroline Connolly

The Importance of Bring Your Own Device (BYOD) Policies for Organizations

Reading Time: < 1 minutes CDG Sr. Technical Program Manager gives her advice on how employee personal devices affect organizations' cybersecurity postures and how to...

Sep 15, 2022
Philip Gavlan

The Importance of Cybersecurity Monitoring

Reading Time: < 1 minutes Engineering corner - Dir of Engineering discusses why monitoring from the outside in is critically important: "If you can see...

May 18, 2022
Lou Rabon

The Importance of Women in Cybersecurity

Reading Time: < 1 minutes The cybersecurity employment gap, the challenges facing women in cybersecurity, cybersecurity job misconceptions, and the underestimation of women's tech saavy...

Jul 13, 2021
CDG

Ransomware Recovery Steps for Businesses

Reading Time: < 1 minutes What are ransomware attacks, why are they such a looming threat to organizations of every size, and how to approach...

Mar 31, 2022
Lou Rabon

The ROI of a Cybersecurity Risk Assessment

Reading Time: < 1 minutes what is a cybersecurity risk assessment, why your organization should invest in them and factors that calculate the return on...

May 09, 2022
Lou Rabon

A Growing Digital Economy Means More Cybersecurity Threats

Reading Time: < 1 minutes Covid-19's stay at home culture created a rushed increase in cloud computing and eCommerce. Why a bigger digital economy calls...

Jan 15, 2021
CDG

Seven Cybersecurity Threats to Cloud Computing You Need to Know About

Reading Time: < 1 minutes CDG's list of seven threats to organizations working in the cloud and how best to mitigate them.

May 06, 2020
CDG

12+ Tips for Secure Remote Working

Reading Time: < 1 minutes CDG's open letter at the beginning of the Covid 19 shutdown on cybersecurity best practices for organizations forced to move...

Mar 17, 2020
CDG

Trust: A Cyber Team’s Most Effective Tool for Proactive Security

Reading Time: < 1 minutes Why trust, team building, and human relations are vital to proactive cybersecurity.

Apr 14, 2020
CDG

Warning Signs of a Cloud Security Breach and How to Respond ASAP

Reading Time: < 1 minutes Why it is critical to catch a cyber breach ASAP, the indicators your team should be on the alert for,...

Mar 08, 2022
CDG

What is a Third-Party Assessment?

Reading Time: < 1 minutes What is a third-party - vendor-risk - assessment, how are they done, and does your organization need to invest in...

Feb 25, 2021
CDG

What is CPRA and How Does it Affect CCPA?

Reading Time: < 1 minutes What is the California Privacy Rights Act, how does it differ from the California Consumer Protection Act, and how to...

Dec 10, 2020
CDG

What Is Incident Response?

Reading Time: < 1 minutes What is "Incident Response"? Why is it important, how does it work, how to assemble your Incident Response Team and...

Feb 04, 2021
Lou Rabon

Why and How Cybersecurity Fits Into Any Budget

Reading Time: < 1 minutes Today just about every organization is a cloud-reliant organization and cybersecurity can be vital to success. Here's how to create...

May 25, 2021
Lou Rabon

ZOOM Security Issues and Best Practices

Reading Time: < 1 minutes CDG's expert cybersecurity advice in reaction to Zoom security issues when they were happening early on during the Covid-19 shutdown.

Apr 09, 2020

Stay updated on the latest cybersecurity content and relevant news.

Copyright © 2022 Cyber Defense Group. All Rights Reserved