security management

Moneyball for Cybersecurity

A guest writer of WEI, see Bill Frank's biography and contact information at the end of this article. Michael Lewis…

6 months ago

Maximizing Incident Response with a Modern SOC

The goal of every security organization is to protect its data. This mission has become increasingly complex in the face…

11 months ago

Using Performance Controls to Address Cybersecurity’s Achilles Heel

See Bill Frank's biography and contact information at the end of this article. [Note: This is an updated version of…

1 year ago

Strengthen Incident Detection and Response with a Left of Bang Cyber Strategy & Mindset

This is the first installment of a two-part series dissecting the Left of Bang strategy and mindset and how it…

1 year ago

Email Security: Protecting Your Organization From Phishing Scams

Email is a vital part of our lives, both for business and personal communications. However, this integral tool is increasingly…

2 years ago

Top 3 Cybersecurity Strategies From CEO Of Cyber Threat Alliance, Michael Daniel

Over the last decade, the topic of cybersecurity has shifted from being a technical subject to a mainstream topic impacting…

3 years ago

3 Key Takeaways From WEI’s Cybersecurity Webinar

Regardless of the subject, there's no one better to learn from than the experts. With this thought in mind, we…

4 years ago

5 Tips For A Comprehensive Cybersecurity Strategy

In the last six months, the fear of cyberattacks has grown significantly, largely due to several high-profile incidents that left…

4 years ago

Does Your Next-Generation Firewall Deliver Performance and Speed?

Networks continue to grow in both size and complexity. Enterprises need modern security solutions that better protect their network traffic.…

6 years ago