407-416-7955 info@cherubas.com
Select Page

Who has time to read the the countless product fliers, brochures, or watches vendor webinars.  But I do make time to read the Cherub cyber-blogs.  They are following (and most of the time are ahead of) the industry trends in cybersecurity and data protection while boiling it all down to easy reading.

Cindy Kelly

Security Manager, University of Georgia

Hacker groups going after government domains

Hacker groups going after government domains

Hacker groups going after government domains Security researchers are suspecting state-sponsored actors. Imagine typing in a government internet address, and ending up on a website that looks like a government website, acts like a government website, but steals your...

read more
Retiring legacy DR for DRaaS benefits can be well worth it

Retiring legacy DR for DRaaS benefits can be well worth it

Retiring legacy DR for DRaaS benefits can be well worth it   The benefits of disaster recovery as a service include lower cost, enhanced reliability and streamlined administration. It's no wonder that more organizations are being drawn to it.   "Disaster...

read more
Hackers broke into university networks in just 2 hours

Hackers broke into university networks in just 2 hours

Hackers broke into university networks in just two hours Penetration testers testing university networks were able to use phishing emails to gain administrator access and access personal data, financial information and confidential research.   Ethical hackers testing...

read more
Best-in-class SIEMs and Honorable Mentions

Best-in-class SIEMs and Honorable Mentions

  Security Information and Event Management (SIEM) is a key enterprise security technology, with the ability to tie systems together for a comprehensive view of IT security.   While each vendor has its own take on SIEM, Gartner lists the primary features for...

read more
DON’T GIVE UP ON YOUR SIEM!

DON’T GIVE UP ON YOUR SIEM!

  DON'T GIVE UP ON YOUR SIEM! It's hard to get SIEMs to work right, and even harder to keep them working. OVERVIEW SIEMs are a significant investment for security programs and they can provide huge value. However, as we all know, it’s challenging to properly...

read more
The Urgent Need for Security Instrumentation

The Urgent Need for Security Instrumentation

"The convergence of business and security is why I think Security Instrumentation is so exciting."       Report: The Urgent Need for Security Instrumentation     Detroit-based cybersecurity research analyst and bestselling author Richard Stiennon describes...

read more
2018 Cost of a Data Breach Study by Ponemon

2018 Cost of a Data Breach Study by Ponemon

2018 Cost of a Data Breach Study by PonemonCherub is proud to sponsor the 13th annual Cost of a Data Breach study, the industry’s gold-standard benchmark research, independently conducted by Ponemon Institute. This year’s study reports the global average cost of a...

read more