Blog
Top 10 Managed Security Services Companies 2022
Cipher: Bolstering a Holistic Risk Management Profile When the pandemic escalated the demand for secure remote access, business started using a variety of different tools to seamlessly run their operations. However, the presence of multiple solutions invited a...
Get your SOC ready to face the new cyber challenges
Get your SOC ready to face the new cyber challenges We already know the more connected and decentralized business operations are, the bigger are the challenges to ensure the integrity of corporate networks protecting data and applications. According to IDC’s...
Hardening Measures for Multi-Factor Authentications
Hardening Measures for Multi-Factor Authentications Authentication plays an important role in any system nowadays. It verifies whether someone is in fact who claims to be. Basic authentication comes in form of password but for some time now, Multi-Factor...
Natural Language Processing and the Identification of Malicious Domains Using a Domain Generation Algorithm
Natural Language Processing and the Identification of Malicious Domains Using a Domain Generation Algorithms Author: Fabiano Barreira One of the premises for defending against threats, is to know and map the attack vectors we are vulnerable to. Being aware of a...
Security Service Edge (SSE) Webinar
Security Service Edge (SSE) Webinar Security Service Edge (SSE) is the set of critical tools within the Secure Access Service Edge (SASE) framework. The set of tools that SSE encompasses give organizations and people a more secure way to enjoy the benefits of...
Cipher Podcast: The Basics of Governance, Risk and Compliance
Cipher Podcast: The Basics of Governance, Risk and Compliance The goals and needs of IT and Cybersecurity are different. IT is more focused on uptime and keeping systems running. Cybersecurity is focused on reducing the risk of data breaches, ransomware and other...
Journey to Cybersecurity Peace of Mind
Journey to Cybersecurity Peace of Mind The journey of a million miles starts with a single step. Or in the case of this analogy, a press of the gas pedal. The journey to a thorough, efficient, and effective cybersecurity posture also must begin somewhere. We will...
Cipher Podcast: DoD CMMC and Executive Orders Explored
Cipher Podcast: DoD CMMC and Executive Orders Explored The US Government has made cybersecurity a key focus for national security. As such, different organizations within the Government have issued guidance related to cybersecurity standards. The Department of Defense...
Cipher Selected as Member of Top Cybersecurity Solution Provider List
Cipher Selected as Member of Top Cybersecurity Solution Provider List CRN, a brand of The Channel Company, has named Cipher to its Managed Service Provider (MSP) 500 list in the Security category for 2022. The Managed Security 100 recognizes companies focused...