<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=446209&amp;fmt=gif">

Building The Cybersecurity Talent Pipeline With CyberTrust & The BSU Cyber Range

By Patrick Gamble |   Apr 02, 2024

As business leaders outside of IT continue accepting cybersecurity as a business strategy rather than just as a digital defense mechanism, there are still major vacancies in the cybersecurity personnel pipeline that require addressing. Knowing this, WEI’s advanced security solutions are complemented by a focus on helping replenish the talent pipeline. This commitment is confirmed by WEI’s partnership with CyberTrust Massachusetts, a non-profit organization working to cultivate a robust talent pipeline. The support CyberTrust receives from its higher education consortium members is paramount, especially with the all-new Cyber Range at Bridgewater State University (BSU) opening earlier this year. 

Using Performance Controls to Address Cybersecurity’s Achilles Heel

By Bill Frank |   Mar 21, 2024

See Bill Frank’s biography and contact information at the end of this article.

[Note: This is an updated version of the original article posted on March 21, 2024. I replaced the term "Governance” Controls with “Performance” Controls to eliminate any confusion with the NIST Cybersecurity Framework 2.0 use of the term “Governance.”

I focus here on automated controls that monitor and measure the “performance” of “Defensive” controls that directly block threats or at least alert on suspicious activities.

How well are your cybersecurity controls performing? Measuring control efficacy is challenging. In fact, under-configured, misconfigured, and poorly tuned controls, as well as variances in security processes are the Achilles Heels of cybersecurity programs.

A mismatch between risk reduction potential and performance results in undetected threats (false negatives) as well as an excessive number of false positives. This leads to an increase in the likelihood of loss events.

All controls, whether people, processes, or technologies, can be categorized in one of two ways – Defensive or Performance.

Four Ways Dell’s 16G PowerEdge Servers Boost Cyber Resiliency For The Enterprise

By Mark Hargreaves |   Mar 12, 2024

Businesses face the constant challenge of fortifying their defenses to maintain resilience, productivity, and uninterrupted operations. This is especially important given the world’s increased data breach events, server outages, and the growing volume of data and users accessing their systems.

Building A Stronger Cybersecurity Future: WEI Partners With CyberTrust Massachusetts

By Todd Humphreys |   Feb 08, 2024

Inside our IT bubble, leaders are aware of the cybersecurity skills shortage that plagues enterprises. As concerning as this challenge is, it may come as a surprise to the general public despite headlines over record ransoms, data leaks, and network breaches. Simply put, there are many more position openings than individuals available to fill them. This imbalance is creating a security gap that cybercriminals are taking advantage of.

Three Benefits Of Veeam’s Data Protection Update To Your Cybersecurity Strategy

By Jay Cardin |   Jan 30, 2024

Imagine your IT organization as a ship sailing the seas. Equipped with a sturdy hull, a reliable power source, and a skilled crew, you’re ready to handle any potential threats that appear during your ocean voyage. However, massive waves from an incoming storm unexpectedly hit, which destroys your ship and sweeps away everything onboard. Despite team’s intense preparation, your vessel and its crew are caught off guard for this specific disaster, leaving survival uncertain.

How To Navigate Modern Data Security Challenges In The Hybrid Cloud Era

By Greg LaBrie |   Jan 16, 2024

Every organization relies on data, and it’s crucial to keep it safe, recoverable, and secure. When it comes to data security, organizations act like vigilant guardians protecting a treasure. To shield against threats like ransomware and hardware failures, they continuously upgrade hardware and software and analyze methods to improve systems and backups. Research suggests that the best way to reduce hidden threats is by using technologies that automate infrastructure checks and implementing network segmentation.

Digging Deeper Into The 2023 MITRE ATT&CK Evaluation

By Shawn Murphy |   Jan 09, 2024

The 2023 MITRE Engenuity ATT&CK® Evaluation results were recently released, and out of 29 participating cybersecurity vendors, only one delivered 100% protection and 100% analytic coverage with zero configuration changes and zero delayed detections. 

The Digital Transformation Era And Beyond: Eight Best Practices In Cybersecurity

By David Fafel |   Dec 26, 2023

In 2023, the era of using data to transform how businesses operate continued to gain steam. To keep up with shifting business demands and ensure data remains safe, security and IT teams need to expand the capabilities within their support teams and the widening IT environments they cater to. The challenge is even more significant with the rise of modern hybrid cloud setups, which trigger unexpected complexity and unknown security vulnerabilities.

Maximize Your Hybrid Cloud’s Potential With Advanced Cloud Security Architecture

By Mike Thweatt |   Dec 19, 2023

As companies adopt multi- or hybrid cloud strategies at a rapid pace to accelerate digital initiatives, the advantages of this technology are not without its challenges. In this blog post, we explore the current state of digital acceleration and cloud security, and how businesses can find an integrated cloud solution that works best for their existing ecosystems.

Migrating To The Hybrid Cloud Starts With Conforming To Next-Gen Security Practices

By David Fafel |   Dec 12, 2023

The hybrid cloud model is continuing its momentum as a preferred operating model for businesses, but its complexities demand constant adaptation to stay ahead of cyber threats. This applies to both on-premises and hybrid environments. Hybrid cloud allows organizations to leverage diverse IT systems, effectively addressing challenges like security, redundancy, and compliance. However, navigating the delicate balance between security and accepted risk is a moving target for organizations.

    About WEI

    WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

    Subscribe to WEI's Tech Exchange Blog


    Categories

    see all
    Contact Us