Blog
Natural Language Processing and the Identification of Malicious Domains Using a Domain Generation Algorithm
Natural Language Processing and the Identification of Malicious Domains Using a Domain Generation Algorithms Author: Fabiano Barreira One of the premises for defending against threats, is to know and map the attack vectors we are vulnerable to. Being aware of a...
Security Service Edge (SSE) Webinar
Security Service Edge (SSE) Webinar Security Service Edge (SSE) is the set of critical tools within the Secure Access Service Edge (SASE) framework. The set of tools that SSE encompasses give organizations and people a more secure way to enjoy the benefits of...
Cipher Podcast: The Basics of Governance, Risk and Compliance
Cipher Podcast: The Basics of Governance, Risk and Compliance The goals and needs of IT and Cybersecurity are different. IT is more focused on uptime and keeping systems running. Cybersecurity is focused on reducing the risk of data breaches, ransomware and other...
Journey to Cybersecurity Peace of Mind
Journey to Cybersecurity Peace of Mind The journey of a million miles starts with a single step. Or in the case of this analogy, a press of the gas pedal. The journey to a thorough, efficient, and effective cybersecurity posture also must begin somewhere. We will...
Cipher Podcast: DoD CMMC and Executive Orders Explored
Cipher Podcast: DoD CMMC and Executive Orders Explored The US Government has made cybersecurity a key focus for national security. As such, different organizations within the Government have issued guidance related to cybersecurity standards. The Department of Defense...
Cipher Selected as Member of Top Cybersecurity Solution Provider List
Cipher Selected as Member of Top Cybersecurity Solution Provider List CRN, a brand of The Channel Company, has named Cipher to its Managed Service Provider (MSP) 500 list in the Security category for 2022. The Managed Security 100 recognizes companies focused...
Cipher Podcast: How to Protect Digital Assets in the Metaverse
Cipher Podcast: How to Protect Digital Assets in the Metaverse The blockchain, cryptocurrency, tokenization, social media, gaming, and the metaverse have created a new class of assets unique to the digital world. These assets have made many rich, but they are...
Cipher Podcast: Adversary Emulation
Cipher Podcast: Adversary Emulation Organizations should understand what happens when they are breached, in order to measure the value or their tools and understand how long it takes for them to detect threat actors. SCYTHE is an Adversary Emulation tool that enables...
Cipher MDR Solution Gets Rave Reviews
Cipher's MDR Solution Gets Rave Reviews Cipher's Managed Detection and Response (MDR) solution is known as CipherBox. An MDR service is designed to augment the existing capabilities and budgets of an organization to protect its business. When repetitive assessment,...