About Rosemarie O'Connor

This author has not yet filled in any details.
So far Rosemarie O'Connor has created 13 blog entries.

What is a Security Operations Center (SOC)? The Complete Guide

What is a security operations center? A security operations center (SOC) is a team of cybersecurity professionals who monitor networks for cybersecurity threats 24/7/365 while responding to cyberattacks and incidents. A SOC’s information security team’s job is to detect, analyze, and respond to cyberattacks. SOCs manage these security incidents in real-time with security tools, machine learning, monitoring tools, threat detection software, ...

2021-11-29T12:06:14-05:00November 29th, 2021|

What Is TTP Security?

TTP Cybersecurity: How it Works?   Thousands of companies fall prey to cyber security crimes every year, risking their physical and intellectual properties. A single cyber threat can be catastrophic for an organization, risking its reputation and operations. And studies show that small and medium-sized businesses are the worst affected by these cyber threats. There are several cybercrimes that an organization ...

2021-11-16T09:38:31-05:00November 15th, 2021|

The Cost of a Cloud Migration

The Cost of a Cloud Migration Many businesses are evaluating the advantages of moving on-premises IT infrastructure to cloud computing, from startups to seasoned corporations and small to large-scale organizations. Many of our clients have discovered that making this change has a variety of advantages, including increased flexibility, scalability, and cost savings. It's critical to understand both the possible costs and ...

2021-10-12T10:13:34-04:00October 12th, 2021|

The NIST Incident Response Plan

The NIST Incident Response Plan   The incident response plan is how the organization reacts to its IT threats, such as its security breaches, server downtimes, and outsider attacks such as hacking and phishing. The incident response process is a step-by-step framework that the organization uses to identify and react to a security threat or a service outage.   What Is ...

2021-10-12T10:10:40-04:00October 12th, 2021|

Cybersecurity Policies for Businesses

Cybersecurity Policies for Businesses When you start a business, you may put security guards as required to ensure the safety of the human resources. However, physical protection is not the only threat to big and small businesses alike. Cyber security is just as essential for small businesses and even more for big ones to protect their devices and their operating systems ...

2021-10-08T17:32:48-04:00October 8th, 2021|

Why Vulnerability Intelligence Is Critical for Strong Cybersecurity

Why Vulnerability Intelligence Is Critical for Strong Cybersecurity A January 2021 analysis by Redscan found that more security vulnerabilities were disclosed in 2020 than in any other year – at an average rate of 50 per day. 57% of these vulnerabilities were classified as “critical” or “high severity”. The Verizon 2020 Data Breach Investigations Report (DBIR) made an important observation about ...

2021-10-08T17:31:38-04:00October 8th, 2021|

Artificial Intelligence & Cybersecurity

Artificial Intelligence & Cybersecurity Artificial Intelligence (AI) is progressively being ingrained in the fabric of business and is being broadly applied across a variety of application use cases. However, not all industries are at the same level of AI adoption: the information technology and telecommunications industry are the most advanced, with the automobile sector trailing closely behind.    Did you know ...

2021-09-10T10:51:53-04:00September 10th, 2021|

Reactive vs Proactive Cybersecurity

Reactive vs Proactive Cybersecurity Cybercrime is expected to cost the world's economy $10.5 trillion annually by 2025. Although it's almost impossible to wrap your head around a number like that, the reality is that security threats are real, and they affect virtually everybody, from large multinational corporations to individual businesses and everything in between. Cyberthreats are becoming considerably more dangerous. Attackers ...

2021-08-30T11:00:54-04:00August 30th, 2021|

Social Engineering Attacks on the Rise

Social Engineering Attacks on the Rise Social engineering techniques are various cyberattacks in which threat actors manipulate people into supplying sensitive data, account credentials, or enabling access to secure networks or systems to get sensitive information. Office files comprise 48% of all malicious email attachments, and spear-phishing was used by 65% of malicious actors as the primary mode of attack. In ...

2021-08-25T11:38:47-04:00August 25th, 2021|

​​Recent Rise of Ransomware Attacks: What Are the Main Drivers?

 ​​Recent Rise of Ransomware Attacks: What Are the Main Drivers? Ransomware is not a new phenomenon. The earliest recorded incident goes as far back as the 1980s. However, today’s ransomware operates at a scale and sophistication that makes it virtually unrecognizable from its early predecessors. Each year, ransomware attacks are hitting a new high. In its annual Internet Crime Report, the ...

2021-08-23T14:03:37-04:00August 23rd, 2021|
Go to Top