by Mike Johnson | Nov 10, 2020 | Cerdant Services
When our team looked at the different SIEM and SOC services currently available on the market, we felt there had to be a better way. In the early days of Cerdant, I used to hear the comment, “I’m not worried about hackers. I’m too small. What could they possibly take...
by Joshua Skeens | Oct 28, 2020 | Cerdant Services
The 2 questions I am asked most regularly are “What is your biggest concern in cybersecurity right now?”, and “What are your favorite resources for cybersecurity news and information?” As I’m sure you can imagine, my answers can shift quite rapidly depending on...
by Joshua Skeens | Oct 15, 2020 | Cerdant Services, Software & Tools
There are a variety of ways to approach managed security services, each of which has strengths and meets different needs. Determining which approach works best for your company is crucial for both safeguarding your digital assets and giving you access to the data you...
by Joshua Skeens | Jun 22, 2020 | Security Best Practices, Software & Tools
Once ubiquitous, traditional anti-virus (AV) software has seen a sharp decline in popularity due to its limited protection capacity. However, recent innovations in the AV sphere, such as the adoption of machine learning algorithms and AI, have reinvigorated this...
by Joshua Skeens | Mar 20, 2020 | Uncategorized
What is SD-WAN? SD-WAN is a software-defined approach to WAN, which in layman’s terms means leveraging software (typically on a hardware appliance) to utilize multiple WAN circuits (such as broadband, LTE, or MPLS). Traditional WANs aren’t designed for the additional...
by Joshua Skeens | Feb 28, 2020 | Security Best Practices
It’s almost impossible to do business these days without relying on the internet. Unfortunately, though the internet has revolutionized how we do business, not all the changes it has brought with it have been positive. Cybercrime continues to be a worldwide threat,...
by Joshua Skeens | Feb 19, 2020 | Cerdant Services, Security Best Practices
We Take PCI Compliance Seriously: Here’s Why That Matters If your organization touches money, you’ve probably heard of PCI compliance. But what does it actually mean, and how can it affect your business? PCI compliance is vital for any business that processes credit...
by Joshua Skeens | Jan 29, 2020 | Security Best Practices
Important Signs That Show Your Network Isn’t as Secure as You Think While the old saying “no news is good news” may apply in some cases, a solid cybersecurity strategy relies on accurate, up-to-date information and regular monitoring to safeguard your...
by Joshua Skeens | Jan 22, 2020 | Security Best Practices
What is a Firewall, & Why is it Important? The death of the firewall has been going around for years and continues today. Let me first say this, the firewall, as many of us know it died 10+ years ago. If I compared a firewall today to my first experience...
by Joshua Skeens | Dec 23, 2019 | Security Best Practices
What Questions to Ask When Choosing Your Security Solution Joshua Skeens, CTO, December 23, 2019 Recently, I spoke at a cybersecurity conference, and between talks, I decided to wander through the vendor area. As I was walking through this vast, crowded room, I...
Recent Comments