Greenlight Blog

Verizon DBIR 2018

by Jasmine Chennikara-Varghese The 2018 Verizon Data Breach Investigation Report (DBIR), which was recently released, reminds us that security is an ongoing challenge against evolving attack vectors and threats. It also acts as an advisory to continually monitor and...

GDPR Is Almost Here… Are You Ready?

by Jasmine Chennikara-Varghese, Greenlight Technologies In less than three months, the European Union’s (EU) General Data Protection Regulation (GDPR) will take effect. The focus of GDPR is to strengthen and unify data protection for EU citizens. This impacts...

When SIEM Data Is Not Enough

by Jasmine Chennikara-Varghese, Greenlight Technologies Security breaches are costly. Just ask Target, Equifax and dozens of other large organizations who have experienced data breaches in the past few years. To improve the ability to detect and respond to security...

Top 5 Breaches of 2017

As we wrap up 2017, the odds are in your favor that at some point your personal information was stolen in one of the 1,200+ breaches reported this year alone. The scariest part is that there are still countless breaches that haven’t been detected yet and corporations...

Connecting the Dots

by Jasmine Chennikara-Varghese With billions on the line, organizations have been aggressively protecting critical data against rogue users and devices. While best practice security measures dictate the need for identity and access management, server hardening and...

Dealing with a Data Breach

by Jasmine Chennikara-Varghese What keeps you up at night? Is it the thought that despite the security measures you put in place, there are threat actors out there aggressively plotting to bypass those measures, exploit vulnerabilities or obtain stolen credentials to...

Bridging the Gaps in Cyber Defense

by Jasmine Chennikara-Varghese There has been an influx of solutions over the past few years to secure protected assets and data. Best practices have evolved requiring companies to adopt a variety of these security solutions including web proxies, firewalls, intrusion...