Blog

Implementing a Threat Intel Program is Critical to Cybersecurity
CISO Best Practices Cyber Security Security Plans

Implementing a Threat Intel Program is Critical to Cybersecurity

Organizations today are under constant attack from cybercriminals so developing an effective threat intel program is imperative as a way to defend your organization. The recently published Consortium Networks’ ...

Intelligence-Driven Security Programs
Cyber Security Security Plans

Intelligence-Driven Security Programs

Cyber Threat Intelligence is an important component of any effective security program. The elevated increase of high-profile breaches in recent years has led to an increasingly complex and stringent compliance ...

Security Awareness and Building a Security Culture
Security Plans Training Material

Security Awareness and Building a Security Culture

User awareness is an important, but an often-overlooked component of your cyber security program. Statistics show that between 70 and 80 percent of all cyber security breaches emanate from some form of user beh...

There Is No Network Security Without Visibility
Endpoint Security Security Plans

There Is No Network Security Without Visibility

I have been in the security business for a very long time, both in the physical and logical realm. In my previous roles and in my current role with Consortium Networks, I often ask our membership about their to...

How Relevant is Security Convergence
Risk Management Security Plans

How Relevant Is Security Convergence?

“Organizations should adopt a comprehensive and integrated strategy that encompasses all areas of security risk”(ASIS Standard) Historically many organizations have managed security functions as independent ...