Transforming Security: The Changing Role of Identity
ISA Cybersecurity Blog
by Laura Hand
1w ago
In today’s world, network access is no longer restricted by time, location, or device. The traditional security perimeters have vanished. Now, identity stands as the keystone for accessing resources and services.  Organizations that fail to recognize the change in the landscape are at serious risk. In fact, 90% of organizations in a 2024 survey reported an identity-related incident in the past year, experiencing phishing attacks, stolen credentials, insider threats, supply chain attacks, and more.   In this article, we delve into the pressing challenges of inadequate identity ..read more
Visit website
Unveiling Hidden Threats: Proactive Strategies to Safeguard Your Supply Chain from Cyber Attacks
ISA Cybersecurity Blog
by Laura Hand
1w ago
About the Author  Ruchir Kumar is our Senior Director, Architecture and Protection. He is a globally–respected cyber leader with over 15 years of experience successfully delivering advisory and implementation engagements across North America, Europe and Asia. He brings a unique blend of consulting and industry experience, with successes spanning across diverse industry sectors (e.g., Crown/federal government, private equity, banking and financial services, and utilities). Ruchir has grown and mentored high performance teams in an inclusive, empathetic way and provided thought leadership ..read more
Visit website
SIEM vs. XDR: What’s Right for You?
ISA Cybersecurity Blog
by Melissa Gallo
3w ago
SIEM (Security Information and Event Management) and XDR (Extended Detection and Response) are two technology solutions at the forefront of any conversation about cybersecurity. But what’s the difference between SIEM and XDR, which one is right for you, and how do you best implement them? In this article, we demystify these technologies to help you decide what’s best for you: SIEM, XDR… or maybe even both. How are they similar? SIEM and XDR solutions are both valuable components of a robust cybersecurity program, and share a number of fundamental similarities: 1. Improved visibility Both SI ..read more
Visit website
My ALS Story by Mark Kirton
ISA Cybersecurity Blog
by Melissa Gallo
3w ago
Every young boy growing up in the prairies, skating on a frozen pond, dreams of playing for the NHL.   I lived that dream from 1978 to 1988, playing for Toronto, Detroit and Vancouver.  I still remember stepping on the ice that first shift in Toronto, and when I scored a goal, I swear my feet didn’t touch the ground for days.  After leaving hockey, I went on to raise a family and develop an ongoing 32-year Real Estate career in Oakville (just west of Toronto).  And even in that, I am fortunate to have a career which still allows me to be successful. Who would have tho ..read more
Visit website
6 Strategies to Help Reduce the Scope of Compliance
ISA Cybersecurity Blog
by Laura Hand
1M ago
Limiting the scope of cybersecurity compliance requirements is a crucial strategy for organizations to manage costs, complexity, and risk effectively. Here are six strategies for maintaining the privacy and security of your sensitive data in a pragmatic way.    Security by design  By observing security by design principles before implementing systems, organizations can significantly reduce cybersecurity compliance burdens by proactively addressing security requirements during development and implementation stages. By incorporating security measures from the outset, vulnerabil ..read more
Visit website
Vulnerability neutralized: Safeguarding Canadian Retail Against Cyber Threats PART TWO
ISA Cybersecurity Blog
by Laura Hand
2M ago
In part two of a two-part series, we speak to Gerard Dunphy, ISA Cybersecurity’s Offering Leader – Detection, Response & Recovery, to share his insights on retail cybersecurity. Gerard is one of Canada’s foremost experts on managing cyber incidents and has been involved in the recovery efforts after some of the country’s highest-profile cyber attacks. In part one, Gerard identified some of the key risks, vulnerabilities, and challenges faced by retailers every day. Here in part two, we explore the tactics and strategies retailers can employ to defend themselves against the threats of tod ..read more
Visit website
Using NIST CSF v2.0 as a Security Springboard
ISA Cybersecurity Blog
by Laura Hand
2M ago
Normally, an update to a cybersecurity regulation or standard isn’t seen as a cause for celebration in many organizations. If your compliance goals are solely to meet regulatory requirements, then an update introduces new requirements. And that means more time, effort, and resources will be required.  The NIST Cybersecurity Framework (CSF) is a bit different. Not only is it an optional standard — meaning that updates don’t necessarily create more required work — but the update to version 2.0 was designed to make it a lot easier to follow. When a cybersecurity standard tailored to critic ..read more
Visit website
Vulnerability neutralized: Safeguarding Canadian Retail Against Cyber Threats
ISA Cybersecurity Blog
by Laura Hand
2M ago
The doors are locked, the systems are down, and business has come to a halt – it’s the fear all Canadian retailers face. And when a cyber attack succeeds, we all feel the impact.  Cybersecurity in the Canadian retail sector has again made headlines in recent weeks with the attack on London Drugs. But before anyone passes judgement, it’s important to understand the cyber challenges faced by the retail industry. Especially given that the retail sector is a vital part of our economy, contributing over $66.7 billion a month to the GDP, and employing millions of people from coast to coast ..read more
Visit website
Implications of AI for Cyber Defense
ISA Cybersecurity Blog
by Laura Hand
2M ago
The emergence of ChatGPT and other publicly-available generative artificial intelligence (GenAI) has ushered in a boom in interest, development, and adoption of AI. Many organizations are exploring how they can integrate AI into their business and the potential benefits that it could provide. (And frankly, those that haven’t, should be!)  One of the potential applications of GenAI — and AI in general — is for cyber defense. Many security companies have been integrating AI and machine learning into their products for years. However, the rapid evolution of GenAI introduces various new se ..read more
Visit website
Why you should outsource your SIEM management today
ISA Cybersecurity Blog
by Laura Hand
3M ago
Whether you are just starting to grow your organization’s security program, or are looking to optimize your current setup, outsourcing your Security Information and Event Management (SIEM) to a Managed Security Services Provider (MSSP) may be the right move for you. Why? Monitoring your own SIEM in your own SOC is a challenge. The majority of the those surveyed in a recent study suggested the biggest constraint to full utilization of their SOC was staffing. 70% of those polled stated retention among their SOC employees was less than five years. Another survey reported that an aver ..read more
Visit website

Follow ISA Cybersecurity Blog on FeedSpot

Continue with Google
Continue with Apple
OR