Industry Trends



The Identity Theft Resource Center (IRTC) reports that in the first 6 months of 2018 companies in the United States publicly disclosed 668 instances of sensitive business and consumer information being compromised by cyber attacks. Adding that 22,408,258 records were exposed in these breaches. These breaches are a common subject […]

SANS Institute Whitepaper on Breach Avoidance


Read all three pages of this infographic to understand the unique insight that Angela Oborne, Regional Director – Security & Technology Consulting at Guidepost Solutions brings to the security industry. You will learn about: The ASIS Young Professionals Council’s recent research How Millennials fit into the security industry What the […]

Guidepost Solutions – Angela Osborne – ASIS Young Professionals Council



Malwarebytes just released their Q3 2018 Cybercrime Tactics and Techniques report.  There are a ton of fascinating findings; some are what you might expect and others are surprising. They combined intel and statistics gathered from July through September 2018 from their Intelligence, Research and Data Science teams with telemetry from both […]

A Review of the Malwarebytes Cybercrime Tactics and Techniques: Q3 ...


New Study Uncovers Network Security’s Biggest Challenges ProtectWise, a leader of Cloud-delivered Network Detection & Response (NDR), released a new report, “The Evolving State of Network Security,” that looks at the biggest network security challenges companies face including staffing priorities, the need for specialized roles, and the inherent limitations of endpoint security. The […]

The Evolving State of Network Security


Nyotron, an Israeli company, and provider of the industry’s first OS-Centric Positive Security solution to strengthen endpoint protection announced that the company has entered into a strategic partnership agreement with Ingram Micro to help it accelerate its global presence – particularly in the United States – and build its global channel ecosystem. […]

Nyotron Enters Into Strategic Partnership With Ingram Micro – Why ...



Malware and Hacking Responsible for Nearly Three-Quarters of All Breaches in 2018 “Financial organizations regularly handle sensitive, regulated data like home addresses, bank statements, and Social Security numbers,” said Rich Campagna, CMO of Bitglass. “This type of information is an incredibly attractive target for criminals, meaning that financial services firms […]

Report: Number of Financial Services Breaches in 2018 Nearly Triple ...





With the ever-evolving threat landscape, increased concern regarding cybersecurity, and the convergence of IT operations and security, many believe that cybersecurity programs must take an all-inclusive approach in addressing security incidents and data breaches. Traditional incident response models primarily offer technical guidance; they are not designed to help organizations gain […]

Going Beyond Incident Response


Employee mobility, BYOD, virtualization, and cloud services have all combined together to present organizations with a large and fluid environment for which they must identify and manage the vulnerabilities of every asset on the network.  A vulnerability scanner can help with this task by assessing computers, systems, and apps for […]

How do you manage vulnerabilities for your ever-changing IT attack ...


The frequency and urgency of conversations about Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and Operational Technology (OT) network security are definitely on the rise. Everywhere you look there are articles, presentations, webinars, and claims of new and better solutions crowding this previously uncrowded space. To help […]

The Simplest and Most Comprehensive Way to Address ICS Risk