Cybersecurity News
Vendor Risk Management: How to Confront Third-Party Cyber Risk in Your Supply Chain
White Paper - In 2017, WannaCry, a ransomware capability released by ShadowBrokers to the general public and exploited by criminal elements, locked...
Why Wannacry Has Made the Cyber World Flat
Just as Thomas Friedman’s best seller, The World is Flat, tackled the complex forces reshaping modern political economy, Wannacry is reshaping cyber...
Is Your Greatest Cyber Risk Hiding in Plain Sight? How to Combat Insider Threat
White Paper - The first thought when it comes to securing the enterprise in today’s increasingly connected world is likely to revolve around...
Confront Evolving Cyber Risks With Foundational Security
Cyberspace is defined as “the notional environment in which communication over computer networks occurs.” This formerly applied only to computers,...
Physical Security: More than Gates & Guards
The presence of physical security in the form of gates and guards offers false hope to companies looking to protect their sensitive data. An...
Global Ransomware Attack – How to Protect Your Company
A ransomware attack spread throughout the world over the weekend, infecting systems in 150 countries and counting. The attack, known as “WannaCry,”...
Vendor Risk Management – Ideas for Smarter Outsourcing
Outsourcing network services is a common business practice for most large companies. From communication service providers to manufacturing...
Secure Halo Animates Cybersecurity Story with New Video
Silver Spring, MD – April 18, 2017 – Secure Halo unveiled a new animated video to describe the cyber risks faced by businesses in today’s digital...
12 Must-Know Steps to Vulnerability Management
As individuals, we take steps to protect ourselves; whether through insurance, credit monitoring, annual physicals, routine teeth cleanings, oil...
Managed Security Services Now Offered by Secure Halo
Silver Spring, MD – April 6, 2017 – Secure Halo, a leader in cybersecurity consulting and enterprise risk assessment, announced the launch of a...
Understanding and Managing Cyber Risk: A Three-part Framework
White Paper - As the infrastructure we rely upon continues to become more diverse and our core business functions become decentralized in the drive...
Insider Threat – NSA Breach Shows Why It Can’t Be Ignored
The recent indictment of a former National Security Agency (NSA) contractor charged with stealing highly classified documents and storing them in...
Cybersecurity in 2017 – a President’s Perspective
No, not the POTUS. We asked Secure Halo president Sean Doherty how cybersecurity has changed in the 10 years since he founded TSC, and what cyber...
A Critical Juncture for National Cybersecurity Policy
Cybersecurity is under a national spotlight with a new administration announcing a 90-day cyber review in response to Russian hacking, and the...
Secure Halo and FICO Join Forces to Improve View of Cybersecurity Risk
Silver Spring, MD - January 10, 2017 - Enterprise security firm Secure Halo today announced a strategic alliance with Silicon Valley analytic...
4 Cybersecurity Resolutions Your Organization Should Keep
With the New Year upon us, we are likely to face new cyber challenges that put the security of our organizations at risk. Despite these new...
Historic Cyber Breaches of 2016
This year has been historic for cyber breaches, both in the magnitude of attacks and in the number of people affected. With connectivity and...
4 Historic Security Events of 2016 and What They Teach Us
Businesses, pay attention! Yahoo and other historic 2016 breaches offer some key lessons. See TSC's infographic published by CSO online.
Four Yahoo Breach Business Lessons
Records are meant to be broken. And Yahoo has done it. This September, Yahoo reported that login and user information was stolen from more than 500...
Why Cyber Resilience Matters in Critical Systems
Cybersecurity is about much more than just protecting your systems from hackers and unauthorized use. Cybersecurity also encompasses responsible...
Continuously Connected: The Hidden Costs in Healthcare Technology Investments
Every day, my Fitbit tracks my calories burned and steps taken. The app on my phone calculates how much protein and fat I’ve consumed based on the...
Protect Your Company From The Fastest Growing Cybercrime – Ransomware
As businesses adopt more and newer internet advances, they face a greater risk of being subjected to cybercrime. Ransomware is one of the fastest...
Break Room to Boardroom: Your Urgent Questions Answered
This October, Secure Halo is participating as a Cyber Champion during the DHS and National Cyber Security Alliance’s National Cyber Security Month...
Building a Culture of Cybersecurity: Only You Can Secure the Network
Well, 2016 is almost over and it’s had no shortage of “cyber” events. Right now you might be thinking about the 200 million Yahoo accounts that were...
Simple Changes to Improve Cybersecurity
In the ever-evolving world of cybersecurity, there are several simple steps you can take to improve the security of both your home and business. It...
What is the Private Sector’s Role in Cybersecurity?
Cyber security has evolved into a central board topic and a core business concern. Gone are the days where cyber risk management was avoidable....
The Answer to Diminishing Returns in Cybersecurity
The defenses of commercial organizations continue to be successfully exploited by determined adversaries operating in cyberspace, despite...
Take Advantage of TSC’s Free Cybersecurity Training in October
October is National Cyber Security Awareness Month (NCSAM), and it’s a great time to help the people in your organization understand...
Social Engineering – How Employees Become Corporate Threats
Work, life, and the internet are intertwined these days - it all happens online and in real time. But the personal details we innocently post leave...
8 Things to Understand Before Buying Cyber Insurance
At Secure Halo, we are proud to have partnered with leading insurance brokers and global underwriting markets to provide pre-and post-binding cyber...
Get In Touch
962 Wayne Ave, #310
Silver Spring, MD 20910
(301) 304-1700 (Sales)
(202) 629-1960 (Office)
info@securehalo.com