Blog

The Best Cybersecurity Awareness Training Vendors Do These 4 Things

Your company is trying to find a good cybersecurity awareness training vendor. But there are a ton of vendors. What’s the difference? In this video, I explain 4 things the best cybersecurity employee training vendors provide. Want my recommendations on

Read more ›

Cybersecurity Insurance Requirements for EDR

Your company is applying for a cybersecurity insurance policy, but what are the requirements for EDR? These days, most cybersecurity policies will require a behavioral-based EDR solution, but what does that mean? In this video, I explain what a behavioral-based

Read more ›

5 Cybersecurity Insurance Requirements for Email Protection

Your company is in the market for cybersecurity insurance, but you’ve heard there are some specific requirements, surrounding email protection? What are they? In this video, I explain 5 cybersecurity insurance requirements for email protection. Want my recommendations on the

Read more ›

Network Infrastructure Management | Cybersecurity Risk Assessment Template

What is the best template to use for a cybersecurity risk assessment, for Network Infrastructure Management? In this video I explain the 8 best practices to protect your company’s data, according to the CIS Framework. Want my recommendations on the

Read more ›

Cybersecurity Risk Assessment Template: Data Recovery

What is the best template to use for a cybersecurity risk assessment, for Data Recovery? In this video, I explain the 5 best practices to protect your company’s data, according to the CIS Framework. Want my recommendations on the best

Read more ›

Cybersecurity Risk Assessment Template: Malware Defenses

What is the best template to use for a cybersecurity risk assessment, for Malware Defense? In this video, I explain 7 steps to protect your company from potential malware threats. Want my recommendations on the best companies to quote for

Read more ›

Cybersecurity Risk Assessment Template: Email and Browser Protection

What is the best template to use for a Cybersecurity risk assessment, for email and browser protection? In this video, I explain 7 steps to protect your email and browser from possible threats. Want my recommendations on the best companies

Read more ›

Cybersecurity Risk Assessment Template: Audit Logs

What is the best template to use for a cybersecurity risk assessment, for Audit Logs? In this video, I explain the best template to follow based on three different categories of cybersecurity requirements. Want my recommendations on the best companies

Read more ›

Cybersecurity Risk Assessment Common Findings: Continuous Vulnerability Management

What are the most common findings of a cybersecurity risk assessment, within the CIS Framework, Control 7: Continuous Vulnerability Management In this video, I explain the 3 most common findings within this control: 1. Continuous Monitoring; 2. Automatic analysis; and

Read more ›

Is SD-WAN secure?

Is SD-WAN secure? Is it more secure than other wide area network technologies, such as MPLS? In the video below, I explain that SD-WAN actually has nothing to do with security. But don’t fear! I also explain ways your company

Read more ›