407-416-7955 info@cherubas.com
Select Page

Who has time to read the the countless product fliers, brochures, or watches vendor webinars.  But I do make time to read the Cherub cyber-blogs.  They are following (and most of the time are ahead of) the industry trends in cybersecurity and data protection while boiling it all down to easy reading.

Cindy Kelly

Security Manager, University of Georgia

Success Story: Solutions and Strategies for Elections

Success Story: Solutions and Strategies for Elections

The growing presence of cyber threats to elections has resulted in many election organizations scrambling to develop security strategies involving people, processes and technology. When developing these security strategies, organizations should consider a three-part...

read more
Gartner Report: Selecting the Right SOC for Your Organization

Gartner Report: Selecting the Right SOC for Your Organization

  Gartner Report:Selecting the Right SOC for Your Organization Historically, the answer to combatting cyber security threats has been to layer point products to solve individual issues. As a result, U.S. companies have: An average of 85 cyber security tools to manage...

read more
Will Data Breaches bring Class Action Lawsuits?

Will Data Breaches bring Class Action Lawsuits?

  The US government has attempted to legislate penalties for data breaches, both federally and by state, in hopes of creating incentives for companies and government agencies to better protect personally identifiable information (PII). See all 50 states and their data...

read more
Security firms seeing spike in Iranian cyberattacks

Security firms seeing spike in Iranian cyberattacks

Stuxnet is a malicious computer worm, first uncovered in 2010. Thought to have been in development since at least 2005, Stuxnet targets SCADA systems and is believed to be responsible for causing substantial damage to Iran's nuclear program. That was then and now Iran...

read more
How you can identify different types of phishing attacks

How you can identify different types of phishing attacks

  Do you know your spear phishing and vishing from your whaling and clone phishing? We explain how to recognize each type of threat. Every data breach and online attack seems to involve some kind of phishing attempt to steal password credentials, to launch fraudulent...

read more