Blog

CIOReview Enterprise Security
Cyber Security News & Events

Consortium Networks Recognized by CIOReview Magazine as “20 Most Promising Enterprise Security Solution Providers 2019”

Annual list showcases the Top 20 Enterprise Security Solution Provider Companies October 16, 2019 – Medford, NJ Consortium Networks, a cybersecurity intelligence, collaboration and consulting organizat...

Consortium X-Solution Intelligence eXchange
News & Events Platforms & Solutions

Consortium Networks Announces New Release of Consortium X Solution Intelligence eXchange

Consortium X is a no-cost membership exchange portal that provides crowdsourced and expert information on security solutions. Consortium X brings together cybersecurity professionals to share information abo...

Consortium-Z-free-threat intelligence platform
Cyber Security Risk Management

Consortium Networks Announces General Availability of Consortium Z Threat Intelligence Platform

Consortium Z is a free, cloud-based threat intelligence aggregation platform that enables organizations to quickly check indicators against known malicious activity. Consortium Networks, a cybersecurity int...

Implementing a Threat Intel Program is Critical to Cybersecurity
CISO Best Practices Cyber Security Security Plans

Implementing a Threat Intel Program is Critical to Cybersecurity

Organizations today are under constant attack from cybercriminals so developing an effective threat intel program is imperative as a way to defend your organization. The recently published Consortium Networks’ ...

Intelligence-Driven Security Programs
Cyber Security Security Plans

Intelligence-Driven Security Programs

Cyber Threat Intelligence is an important component of any effective security program. The elevated increase of high-profile breaches in recent years has led to an increasingly complex and stringent compliance ...

Security Awareness and Building a Security Culture
Security Plans Training Material

Security Awareness and Building a Security Culture

User awareness is an important, but an often-overlooked component of your cyber security program. Statistics show that between 70 and 80 percent of all cyber security breaches emanate from some form of user beh...

There Is No Network Security Without Visibility
Endpoint Security Security Plans

There Is No Network Security Without Visibility

I have been in the security business for a very long time, both in the physical and logical realm. In my previous roles and in my current role with Consortium Networks, I often ask our membership about their to...

How Relevant is Security Convergence
Risk Management Security Plans

How Relevant Is Security Convergence?

“Organizations should adopt a comprehensive and integrated strategy that encompasses all areas of security risk”(ASIS Standard) Historically many organizations have managed security functions as independent ...