Under Attack? Contact Us

Cyber Defense Group Resource Hub

Blogs

February 26, 2024

Cyber Defense Group Welcomes Former USC CISO Gus Anagnos as COO to Spearhead Hypergrowth Strategy
Videos

February 15, 2024

Quick Tips: Consequences of an Unprepared Cyber Attack
Videos

February 15, 2024

Quick Tips: Are You Spending the Right Amount on Security?
Videos

February 15, 2024

How to Defend Your SME Clients: Safeguarding Against Cybersecurity Vulnerabilities and Threats
A cybersecurity team monitors threats in a high-tech trading environment, underscored by digital locks and global finance symbols.
Blogs

February 15, 2024

How DarkMe Malware Targets Traders and How to Protect Your Business
Blogs

February 2, 2024

Battle of Compliance Standards: SOC 2 compliance vs ISO27001
vciso
Blogs

January 19, 2024

Unlocking vCISO: The Key to Safeguarding Your Business in the Digital Age
Blogs

January 9, 2024

Exploring the Cybersecurity as a Service Market: Growth, Challenges, and Opportunities for SME Businesses
Cybersecurity Questionnaire
Blogs

December 11, 2023

Zero to Compliance: What to do When a Customer Gives You a Cybersecurity Questionnaire and You’re Not Ready
cyber security budget
Blogs

November 6, 2023

How to Create an Effective Cybersecurity Budget
Blogs

October 2, 2023

7 Steps to Achieving a Strong Cybersecurity Posture: Enhance Your Online Security Today
risk assessments guide
Blogs

September 25, 2023

The Critical Role of Risk Assessments in Cybersecurity
Cybersecurity-as-a-Service is crucial to your business
Blogs

September 20, 2023

Cybersecurity-as-a-Service: Why It’s Important Now
What is a third party risk assessment
Blogs

September 11, 2023

What are Third Party Risk Assessments?
Blogs

September 6, 2023

Top 6 Reasons Mid-Market Businesses Can’t Ignore Cybersecurity: Leveling Up Your Cybersecurity Game
blog banner showing the blog title SEC new cybersecurity rules
Blogs

August 29, 2023

Mastering Cybersecurity Compliance: Navigating SEC’s New Rules and Elevating Your Cyber Defense
Videos

August 28, 2023

How to Automate Security, Governance & Privacy for Cloud Data Innovation
This is a banner image for the Moveit transfer breach cybersecurity incident
Blogs

August 2, 2023

Decoding the MOVEit Transfer Breach: Insights and Lessons for Enhanced Cybersecurity
Blogs

July 10, 2023

What is a Third-Party Risk Assessment?
Image-showing-man-caring-about-risk-assessments-in-Cloud-environment
Blogs

June 27, 2023

5 Step Guide to a Cybersecurity Risk Assessment
Blogs

February 15, 2023

How to be Compliant With New State Data Privacy Laws in 2023
Telemedicine guest panel CDG
Videos

December 29, 2022

Webinar | Securing Telemedicine
What is California Privacy Rights Act
Blogs

November 28, 2022

What is California Privacy Rights Act (CPRA) Compliance?
Blogs

October 7, 2022

How to Implement a Successful Cyber Awareness Program
A Holistic Approach to Cybersecurity Assessment - CDG
Blogs

September 30, 2022

The Holistic Cybersecurity Assessment: A CDG Differentiator
Blogs

September 15, 2022

The Importance of Bring Your Own Device (BYOD) Policies for Organizations
What is reasonable security
Videos

August 10, 2022

CCPA Webinar With Zimmer Legal, Sept. 15, 2020
Lou Rabon, CEO CDG
Videos

August 5, 2022

CDG – Solarwinds Hack Info
Telemedicine guest panel CDG
Videos

August 5, 2022

Securing Telemedicine Webinar
CDG in the TOP 100 of Inc 5000's Fastest Growing Companies!
Videos

August 5, 2022

CDG in the TOP 100 of Inc 5000’s Fastest Growing Companies!
how to be cyber secure in 2022
Videos

August 5, 2022

#1 Thing Organizations Can Do To Be Cyber Secure in 2022
Message from CDG CEO
Videos

August 5, 2022

Cyber Defense Group – Message From the CEO – Russia & Ukraine
Quick Tips - Disinformation & Phishing
Videos

August 5, 2022

Cyber Defense Group – Quick Tips – Disinformation & Phishing
CDG's Technical Program Manager
Videos

August 5, 2022

3 Tasks to Help Secure Your Organization Today – from CDG’s Technical Program Manager
CEO Lou Rabon responds to White House Statement on Cybersecurity
Videos

August 5, 2022

CEO Lou Rabon responds to White House Statement on Cybersecurity
Case Studies

August 5, 2022

Unitas Global – From Compliance Needs to a Proper Cybersecurity Infrastructure
get a professional security assessment
Videos

July 31, 2022

CDG- Quick Tips – Get a Professional Security Assessment BEFORE applying for Cyber Insurance
CDG Technical Program Manager, Caroline Connolly
Videos

July 31, 2022

CDG Technical Program Manager, Caroline Connolly gives tips to help protect against elder scams
CDG Director of Engineering
Videos

July 30, 2022

CDG Director of Engineering breaks down software & technology company Cybersecurity best practices
Case Studies

July 21, 2022

Establishing Application Security While Navigating HIPAA Compliance
Case Studies

July 21, 2022

Securing an Intuitive Digital Platform & Providing Holistic Protection Against Evolving Threats
Case Studies

July 21, 2022

Turning an Outside Cybersecurity Partner Into an In-House Strength
Case Studies

July 19, 2022

A Longstanding Security Partnership with vCISO Services
Blogs

May 18, 2022

The Importance of Cybersecurity Monitoring
Hand full of cash
Blogs

May 9, 2022

Cybersecurity Risk Assessment ROI
prevent Elder Scams
Blogs

April 22, 2022

Cybersecurity Best Practices to Prevent Elder Scams
Ransomware Recovery Steps
Blogs

March 31, 2022

Ransomware Recovery Steps for Businesses
Cloud Graphic - The War in Ukraine and Its Impact On Your Cybersecurity Program
Blogs

March 17, 2022

Immediate Steps to Take During This Time of Increased Cyber Activity
Cybersecurity Breach
Blogs

March 8, 2022

Warning Signs of a Cloud Security Breach and How to Respond ASAP
Solar Panels
Blogs

December 17, 2021

How to Make Sense of the SolarWinds Hack
Zero Day Exploit Graphic
Blogs

December 10, 2021

RCE 0-day exploit found in log4j2
Security Cameras
Blogs

October 14, 2021

Treat Every Month Like Cybersecurity Awareness Month
The Right Cybersecurity Team
Blogs

September 28, 2021

Cyber Attack Prevention Starts with Finding the Right Team
Cyber Threat Modeling
Blogs

September 14, 2021

Cyber Threat-Modeling: A Proactive Step in Prevention
Hacker Mentality
Blogs

August 24, 2021

The Hacker Mentality We Hold
Committing to Security
Blogs

August 11, 2021

Committing to Security Pre-Product
Women in Cybersecurity
Blogs

July 13, 2021

The Importance of Women in Cybersecurity
HIPPA Compliance & Cloud Compliance
Blogs

June 22, 2021

HIPAA & Cloud Compliance – A Growing Relationship
Compliance and Cybersecurity
Blogs

June 8, 2021

SOC-2 and ISO 27001 Compliance and Cybersecurity
Computer Network Cables
Blogs

May 26, 2021

The Era of Faking Security is Over
Laptop
Blogs

May 25, 2021

Why and How Cybersecurity Fits into Any Budget
Cybersecurity Investment
Blogs

May 18, 2021

Save Your Business and Invest in Cybersecurity
how cloud computing saves money
Blogs

March 24, 2021

How Cloud Computing Saves You Money and Gives You Peace of Mind
Computer Screens
Blogs

February 4, 2021

What is Incident Response?
Laptop with Credit Card
Blogs

January 15, 2021

A Growing Digital Economy Means More Cybersecurity Threats
Computer Screens
Blogs

January 7, 2021

Top 5 Reasons Why the Enterprise is Getting Cybersecurity Wrong
Security Lock on Laptop
Blogs

December 10, 2020

What is CPRA and How Does it Affect CCPA?
Man on Laptop in Office
Blogs

December 4, 2020

How COVID and Ransomware Have Affected Healthcare Cybersecurity
Tools
Blogs

August 11, 2020

How to Save Costs and Maximize Value on Cybersecurity Tools
what is devsecops
Blogs

July 24, 2020

Defining DevSecOps and Applying its Best Practices
Container Security
Blogs

July 21, 2020

Container Security
Keyboard With California Consumer Privacy Act Button
Blogs

July 16, 2020

What are CCPA Regulations?
Laptop With Icons
Blogs

July 9, 2020

What is Endpoint Security?
CISO
Blogs

May 19, 2020

Why Your CISO is Ineffective and What You Can do About it
cybersecurity threats to cloud computing
Blogs

May 6, 2020

Seven Cybersecurity Threats to Cloud Computing
Coworkers Discussing Files
Blogs

April 30, 2020

Building an Incident Response Team & IR Process
Man Working on Laptop
Blogs

April 28, 2020

Initial Incident Response Procedure – The Six Critical Steps to Take
Female Math Teacher at Laptop
Blogs

April 24, 2020

The Impact of Cyber Debt to Agile Organizations
cybersecurity alert framework
Blogs

April 16, 2020

Decision-Driven Cybersecurity Alert Framework
Man Pointing to Computer Screen
Blogs

April 14, 2020

Trust: A Cyber Team’s Most Effective Tool for Proactive Security
Ransomware Key on Keyboard
Blogs

April 10, 2020

How to Deal With – and Avoid – Ransomware Incidents
Man With Headphones Looking at Monitor
Blogs

April 9, 2020

ZOOM Security Issues and Best Practices
Man Working Remotely
Blogs

March 17, 2020

12+ Tips for Secure Remote Working

Stay in the know, subscribe to our Newsletter.

Copyright © 2024 CDG. All Rights Reserved