security management

Moneyball for Cybersecurity

A guest writer of WEI, see Bill Frank's biography and contact information at the end of this article. Michael Lewis…

8 months ago

Maximizing Incident Response with a Modern SOC

The goal of every security organization is to protect its data. This mission has become increasingly complex in the face…

1 year ago

Using Performance Controls to Address Cybersecurity’s Achilles Heel

See Bill Frank's biography and contact information at the end of this article. [Note: This is an updated version of…

1 year ago

Strengthen Incident Detection and Response with a Left of Bang Cyber Strategy & Mindset

This is the first installment of a two-part series dissecting the Left of Bang strategy and mindset and how it…

2 years ago

Email Security: Protecting Your Organization From Phishing Scams

Email is a vital part of our lives, both for business and personal communications. However, this integral tool is increasingly…

2 years ago

Top 3 Cybersecurity Strategies From CEO Of Cyber Threat Alliance, Michael Daniel

Over the last decade, the topic of cybersecurity has shifted from being a technical subject to a mainstream topic impacting…

4 years ago

3 Key Takeaways From WEI’s Cybersecurity Webinar

Regardless of the subject, there's no one better to learn from than the experts. With this thought in mind, we…

4 years ago

5 Tips For A Comprehensive Cybersecurity Strategy

In the last six months, the fear of cyberattacks has grown significantly, largely due to several high-profile incidents that left…

4 years ago

Does Your Next-Generation Firewall Deliver Performance and Speed?

Networks continue to grow in both size and complexity. Enterprises need modern security solutions that better protect their network traffic.…

6 years ago