Cybersecurity Blog: The Cyber Scene is evolving, are you?

For security teams, monitoring the security status of an IT network is common practice, while the routers, switches, and gateways of industrial networks go largely unchecked. Fortunately, this is changing. With the rapid increase in cybersecurity incidents affecting industrial control systems (ICS), more and more organizations are adopting ICS security programs to keep their operations running and people safe. If your organization plans (or is already underway) to develop its own ICS security program, here are four foundational elements to help you build the most effective program possible.

Read more

Successful integration, motivated leaders, and driven employees propel Leidos to the #1 fastest growing cybersecurity consulting company


Coming in at the No. 1 spot with an astronomical growth rate of 82.1 percent year over year was Leidos. The company reported cybersecurity consulting revenues of $285 million in 2016, up from $157 million the year before. – CRN.com

Read more

Leidos Cyber UK is CREST certified for Penetration Testing, Incident Response and Cyber Essentials.

This accredits Leidos Penetration Testing programme as complying with CRESTs rigorous requirements for penetration testing providers, and gives organisations a level of assurance over the quality of testing that will be delivered.

Read more

Part 4: Training and defined management procedures are critical to program success.

Today’s insider risk programs typically rely solely on mitigation as the remedy to address every insider risk. But this approach leaves out critical measures to address all components of risk.

Read more

Today, organizations invest significant resources to harden their perimeters against exterior attacks. Unfortunately, many of these same companies invest far less to protect themselves against internal threats—individuals who have direct access to sensitive and proprietary information.

Read more

Part 3: Successful insider risk programs begin with good choices—prioritizing what to protect and how to protect it.

While often overlooked as a critical component to enterprise security, the insider threat is difficult to ignore when organizations increasingly lose critical assets (intellectual property, proprietary data, network infrastructure, financial assets, facilities, etc.) due to an individual's theft or negligence.

Read more

Part 2: Communication and documentation contribute to building a successful insider risk program.

When implementing an insider risk program, it is necessary to take foundational measures to integrate both technical and non-technical elements for a truly holistic defense.

Read more

Part 1: Review the first two of eight components to building a successful insider risk detection program that goes beyond network monitoring.

One of the most common questions posed by customers looking to either launch a new insider risk program or improve their existing efforts in threat detection–where do I start? How do I kick-off my insider risk program to go beyond solely network monitoring?

Read more

Many corporations invest significant resources to improve their defenses against external threats but too often fail to adequately protect themselves from internal risks—risks created by insiders with direct access to critical corporate assets. Neutralizing internal threats is as important to strengthening overall security and reducing organizational risk as protecting against external attacks.

Today’s insider risk programs typically rely solely on mitigation as the remedy to address every insider risk. But this approach leaves out critical measures to address all components of risk. To execute a successful insider risk program, the entire organization must be engaged to accurately evaluate key factors that contribute to risk: threats, vulnerabilities, and assets.

Read more

15 companies from around the globe share their Cybersecurity insights at this year’s Gartner Security and Risk Summit

Attendees from a variety of industries sat with us for a 45-minute “CISO Roundtable Chat” at the 2017 Gartner Security & Risk Management Summit.

Read more