CyberSheath Services International, LLC – Making The Right Cyber Security Moves

By Eric Noonan • December 10, 2014

By Ambili Sasidharan in CIO Review

eric_CIO_ReivewWith the recent cyber attacks at eBay, Paypal, Target, Sony Picture, and JP Morgan Chase, the cyber security seems to be losing in the game of whac-a-mole. The game has been a costly one for businesses that spend billions of dollars to address new threats every day. It’s getting increasingly difficult and costly to protect even the most basic technology from a growing throng of hacking tools. In an exclusive interview with CIO Review, Eric D. Noonan, CEO at CyberSheath discusses the current landscape of cyber security and CyberSheath’s methodology for delivering security services that provide demonstrable business value.

Read the full article here.

Cybersheath Blog

3 Reasons Why You Need a Privileged Access Risk Assessment

A privileged account is one used by administrators to log in to servers, networks, firewalls, databases, applications, cloud services and other systems used by your organization. These accounts give enhanced permissions that allow the privileged user to access sensitive data or modify key system functions, among other things. You can…

Incident Response – Learning the Lesson of Lessons Learned

“Those who do not learn from history are condemned to repeat it.” Over the years, variations of this famous quote have been spoken by everyone from philosophers to world leaders. The message — that we must learn from our mistakes or continue to repeat them — is also highly relevant…

What is DFARS 252.204-7012 and NIST SP 800-171?

With the Department of Defense (DoD) promising the release of an update to NIST Special Publication 800-171, it is imperative defense contractors understand what DFARS 252.204-7012 and NIST SP 800-171 Clause is and how noncompliance with the Clause will impact their business.  Compliance is mandatory for contractors doing business with…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Trace Security