Want to be a cybersecurity hero this holiday? Here’s how.

Posted by:

Ahhh December 2016. It is that time of year again. Christmas and other holiday celebrations are just days and weeks away.

However you celebrate, whether you are planning the festive feast, travelling to a far-flung location, or madly getting your gifts ready, you’re likely to be with others: your family, your pals, your in-laws, your friends or work associates.

So we have a proposal for all you IT security-savvy types out there…Join TBG Security’s

IT Security Holiday Lock Down

Here is our ...

Read More →
0

Offensive Security Unbound: introducing Red Team Service

Posted by:

With new cyber threats exploding into existence and commandeering what we would normally consider to be well-defended networks, our concern was straight-forward: how do we provide more effective security measures for our TBG Security customers?

We decided to get down to brass tacks to figure out how we could elevate IT security to the next level.

Instead of offering spot checks at set times, what if TBG Security set up a team of accredited security professionals that could use the methods an ...

Read More →
0

Want to outsource your IT security? 43 questions to ask

Posted by:

When it comes to outsourcing IT security, there is no one size fits all.

In the last blog post, Is outsourcing your IT security right for your organization, we looked at why some companies choose to outsource their IT security requirements.

Here, we are going to find out how you identify a good IT security firm.

IT security is specific to every organization. It depends on what assets you are trying ...

Read More →
1

Is outsourcing your IT security right for your organization?

Posted by:

Imagine you are running a large, swanky five-star hotel where guests expect to pay for luxury services. You might conclude that having full-time medical doctors on staff is worth the investment.

However, were you running a leaner hospitality operation, the associated costs of full-time doctors would simply be prohibitive, putting your business under unnecessary financial strain.

Now compare this scenario to that of a growing business needing to secure its systems, data and users from unauthorised access and malicious software.

For a few ...

Read More →
0

TBG Security secures top placement in the Palmetto Cyber Defense Competition

Posted by:

Earlier this month, TBG Security took part in the The Palmetto Cyber Defense Competition (PCDC).

PCDC is a three-day cyber defense competition created through the collaboration of two organizations: the Space and Naval Warfare Systems Center Atlantic (SPAWAR) and the South Carolina Lowcountry Chapter of the Armed Forces Communications and Electronics Association (AFCEA).

Designed to energize high school and college students about an exciting future in the cybersecurity ...

Read More →
0

Three BIG security threat predictions for 2016: Make sure you are covered!

Posted by:

With many security companies pushing out their threat predictions for 2016, we thought it best to review as many as we could in order to compile a definitive list of what to look out for in this coming year.

And, as independent consultants without any direct or indirect ties to specific security providers, we are well placed to provide an product-agnostic perspective on the state of security in 2016.

More importantly, we wanted to give you expert advice on how you can ...

Read More →
0

Heartbleed Bug – Open SSL Vulnerability Solution

Posted by:

heartbleed solutionThe TBG Security team has been investigating a critical vulnerability in the OpenSSL cryptographic library.  This vulnerability, which is known as the “Heartbleed Bug,” allows anyone on the Internet to read the memory of systems protected by vulnerable versions of the OpenSSL software.  This issue should be considered extremely critical due to its impact, long exposure, ease of exploitation, the absence of application ...

Read More →
0

SEC Struggles on Cyber-Security

Posted by:

sec cybersecurity

If you’re sick of reading about cyber-security then you’ll want to find another article to read right now because we’re going to talk about cyber-security here.

Not only are we talking about it but apparently the Securities and Exchange Commission spent 5 hours talking about it last week at it’s cyber-security roundtable. The Center for Audit Quality published guidance on cyber-security risks one day before ...

Read More →
0

Big Data Analytics: Is It The Future Of IT Security?

Posted by:

big data analyticsIf you’re not using analytics tools to support your IT Security Risk Management efforts what are you using in their place?

Big data analytics tools will be crucial to enterprise security as criminals deploy faster and more sophisticated methods to steal valuable data, according to security firm RSA.

“We are really at the beginning of intelligence-driven security: it is just the tip of ...

Read More →
0

Improving Security via Proper Network Segmentation

Posted by:

We all strive to create 100% secure network but if the bad guys want to get in they’re going to.  Simple as that.  In the mean time there’s no point in creating a single point of failure architecture. Nimmy Reichenberg takes a look at “zoning” and how this can be an effective control to mitigate risk and hamper the bad guys if they do penetrate your network.

By properly segregating the network, you are essentially minimizing the level of access to ...

Read More →
0
Page 1 of 2 12
})
SEC Cybersecurity Exams