Blog

The Types of Pentests You Must Know About

The Types of Pentests You Must Know About

Penetration testers are hired to compromise your security, identify vulnerabilities, and provide you solid recommendations for hardening your security posture. But, are you familiar with the various types of...

25 Tips for Protecting PII and Sensitive Data

25 Tips for Protecting PII and Sensitive Data

25 Tips for Protecting PII and Sensitive DataWe’re inundated  with requests for our personally identifable information (PII) and even sensitive data yet we sometimes don’t put in the right controls to protect...

A Quick NIST Cybersecurity Framework Summary

A Quick NIST Cybersecurity Framework Summary

The National Institute of Standards and Framework’s Cybersecurity Framework (CSF) was published in February 2014 in response to Presidential Executive Order 13636, “Improving Critical Infrastructure...

10 Step Patch Management Process Template

10 Step Patch Management Process Template

10 Step Patch Management Process Template Patching can be a big challenge when you have hundreds maybe even thousands of IT assets to manage. With information security initiatives, it helps when you have a...

10 Personal Cyber Security Tips — #CyberAware

10 Personal Cyber Security Tips — #CyberAware

10 Personal Cyber Security Tips — #CyberAwareWith these ten personal cyber security tips, we are aiming to help our readers become more cyber aware. We developed these security tips from our experience...

We Have Prevention Bias

We Have Prevention Bias

We Have Prevention Bias: One can say that there are three stages of information security operations: Prevention, Detection, and Response. Of the three, it is usually prevention that gets the most attention. It...

Cipher News,

stay updated on the latest cybersecurity
content and relevant news.

Are you ready to take your cybersecurity
to the next level?


Social Media

LinkedIn

LinkedIn


Social Media

Twitter

If a data breach happens, there are some important steps that your organization must take in order to reduce cost from a breach and ensure maximum protection of... your company brand and reputation. #cybersecurity https://t.co/z2S7Yficub


Social Media

Facebook


Insights

Whitepaper

Dig into the details of cybersecurity and regulations by reading our exclusive white papers. Each paper is written by an expert at Cipher and full of insight and advice.

 

Learn more

\