407-416-7955 info@cherubas.com
Select Page

Who has time to read the the countless product fliers, brochures, or watches vendor webinars.  But I do make time to read the Cherub cyber-blogs.  They are following (and most of the time are ahead of) the industry trends in cybersecurity and data protection while boiling it all down to easy reading.

Cindy Kelly

Security Manager, University of Georgia

State Of Cybersecurity Report 2020 – update

State Of Cybersecurity Report 2020 – update

  This report outlines many of the numerous and varying trends currently impacting the information security industry. It also demonstrates some of the deducible differences between individual sectors with regards to how certain trends are perceived.     Infosecurity’s...

read more
The FireEye Approach to Effective Cloud Security

The FireEye Approach to Effective Cloud Security

  In many ways, the public cloud is more secure than a traditional data center. Asset management, inventory, audit logging, two-factor access controls, connectivity redundancy and firewalls are built into the cloud provider platform. Servers are easier to patch and...

read more
All Roads Lead to the Browser

All Roads Lead to the Browser

  Defending modern enterprises often requires advanced thinking and out-of-the-box solutions. In our experience, legacy security policies and implementations, such as outdated security tools, lack of visibility and/or a failure to protect the end user, are equally...

read more
Is Now the Time for Outsourcing Security Services?

Is Now the Time for Outsourcing Security Services?

For years we’ve been talking about the skills shortage that plagues the cybersecurity industry and which some reports now peg at 3.5 million and growing. Organizations lack trained, experienced resources in many areas including expertise in management and monitoring...

read more
Best practices for implementing security awareness training

Best practices for implementing security awareness training

  What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your...

read more