October 28, 2022
Cybersecurity Risk Management Starts With Visibility
A basic question to answer for managing and mitigating cybersecurity risks is, do you know what you need to secure? Yet many organizations struggle with answering that question. Getting visibility into the organization’s devices, applications, networks, data, and users – including how many, where they are, and how vulnerable they are – is the first […]
Read more
October 27, 2022
What do Disaster Recovery and Business Continuity have to do with Cybersecurity?
In honor of National Cybersecurity Awareness month, Sayers will be releasing a series of short videos focused on various cybersecurity topics. In this episode, I’d like to provide you with some quick information about Disaster Recovery and Business Continuity. With that in mind, you may be asking yourself: “What do Disaster Recovery and Business Continuity […]
Read more
October 20, 2022
Secure Your Future: Cyber Insurance in the Age of Digital Risk
What exactly is Cyber Insurance? Also known as Cyber Liability insurance, Cyber Insurance can offset some of the financial damages that result from cyberattacks. Costs associated resulting from a cyber attack may include data recovery, damage caused to other systems, or damages from loss of customer data. Are organizations really BUYING THIS?? Yes! In fact, cyber insurance […]
Read more
October 18, 2022
Responding to a Cyber Attack
In honor of National Cybersecurity Awareness Month, Sayers will be releasing a series of short videos focused on various cybersecurity topics. In this episode, I’d like to provide you with some insight on how to RESPOND to a Cyber Attack. It is almost inevitable that your organization will be affected (at some level or another) […]
Read more
October 11, 2022
5 Tips to Combat Phishing Attacks
In honor of National Cybersecurity Awareness month, Sayers will be releasing a series of short videos focused on various cybersecurity topics. In this episode, I’d like to provide you with some steps to identify and combat phishing attacks. When a social engineering attack occurs, the attacker uses human interaction (typically via social skills) to obtain or compromise […]
Read more
October 05, 2022
Identity & Access Management: The 3 Pillars of IAM
In honor of National Cybersecurity Awareness month, Sayers will be releasing a series of short videos focused on various cybersecurity topics. In this episode, I’d like to provide you with an overview of Enterprise Identity and Access Management (IAM). Identity and Access Management, often referred to as IAM, are the structures and processes within an […]
Read more
September 29, 2022
Cybersecurity Asset Management: Know What to Protect
Author: Chris Cochran Chris is Creative Director and Cybersecurity Advocate at Axonius, co-founder of Hacker Valley Media, and producer/host of the award-winning Hacker Valley Studio Podcast. Chris has extensive experience building and running strong cybersecurity and content programs. For more on the topic of cybersecurity asset management, watch the 17-minute “Bridging the CAASM” session presented by Chris […]
Read more
April 13, 2022
Be Cyber Secure: Prepare Now for Online Threats (2024)
It’s very difficult to predict where the next cyber attack may come from, and in what form. A cyber threat to critical IT infrastructures, financial systems, and transportation channels can cause immense damage to a population. The current media coverage of warring nations is a stark reminder to corporations and organizations that there has, and […]
Read more