Insights > Blog

In the CIPHER blog, you will find helpful information security articles, trends in cybersecurity, and insight on threats and cyber attacks. Our team of information security experts, a multidisciplinary group of professionals, are dedicated to addressing incidents and security best practices in this blog discussion.

Blog

Cipher Podcast: Secrets to Becoming PCI Compliant

Cipher Podcast: Secrets to Becoming PCI Compliant

Cipher Podcast: Secrets to Becoming PCI Compliant In this episode, we look at what the Payment Card Industry (PCI) regulations and compliance is all about. We welcome Principle Cybersecurity Consultant Juan Munera to cover the top questions he encounters regarding...

MDR: Build vs. Buy

MDR: Build vs. Buy

MDR: Build vs. Buy Author: David Rickard, CTO, North America The decision to improve your cybersecurity posture is an important one. Outsourcing the work to a vendor or handling in house is a first decision. What is MDR? First of all, what is Managed Detection and...

Webinar Replay: How To Make PCI Compliance Easier

Webinar Replay: How To Make PCI Compliance Easier

Webinar Replay:  How To Make PCI Compliance Easier As more transactions happen online, your PCI DSS compliance is more important than ever. Watch the video below for helpful tips to make compliance easier:Cipher is a trusted adviser who can help you maintain PCI DSS...

Cipher Podcast: Proactive, Reactive and Recovery Services

Cipher Podcast: Proactive, Reactive and Recovery Services

Cipher Podcast: Proactive, Reactive and Recovery Services We discuss business resiliency and disaster recovery with the CTO of Webair Sagi Brody in this episode. Confidentially, integrity and availability are the foundation for a successful cybersecurity posture....

The 3 Numbers Behind eCommerce Payments

The 3 Numbers Behind eCommerce Payments

3 Numbers Behind eCommerce Payments Online shopping keeps getting more and more popular. In-store transactions are increasingly moving online. Even if a person picks up an item in a store or restaurant, the ordering might happen before online or via the store app. In...

Cipher Podcast: Effective Cybersecurity Operations

Cipher Podcast: Effective Cybersecurity Operations

Cipher Podcast: Effective Cybersecurity Operations In this episode, we talk with Cipher’s Security Operations Center Manager in Portugal, Gonçalo Amaro. He goes over his real-world experience stopping hackers at each step of the cyber kill chain. Frameworks like MITRE...

Stop Malicious Insiders with the AAA Framework

Stop Malicious Insiders with the AAA Framework

Stop Malicious Insiders with the AAA Framework A series of tweets rocked the world recently. The following accounts had messages posted to them from a criminal impersonator: Elon Musk - Twitter.com/elonmusk Bill Gates - Twitter.com/BillGates Joe Biden...

Cipher Podcast: Behind the Scenes of Blue Team Operations

Cipher Podcast: Behind the Scenes of Blue Team Operations

Cipher Podcast: Behind the Scenes of Blue Team Operations This topic of this episode is Red vs. Blue Team operations. The team even touches on the new Purple Team concept. Cipher Director of Technology and SOC Manager Ricardo Encinosa explores Blue Teams, which are...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.