The root causes of data breaches are phishing, malware, software vulnerabilities, third-party compromise and abuse, unencrypted data, and inadvertent employee mistakes.
what we recommend
We’ve reviewed enterprise products with leading security experts to provide you with top provider recommendations.
Protect against phishing.
We recommend Agari, DomainTools PhishEye, Shape Security, YubiKey.
Protect from malware.
We recommend Blue Hexagon, Cyberinc Isla, Broadcom.
Protect against software vulnerabilities.
We recommend Aegis open-source vulnerability management Blackduck (Synopsys), Coverity (Synopsys), DeepFactor, Kenna Security, Opsera, Rapid7, Nexpose, and Tinfoil (Synopsys).
Protect from third party breaches.
We recommend RSA Archer and SecurityScorecard.
Protect against unencrypted data.
We recommend enabling BitLocker and FileVault on all endpoints. Additionally, MobileIron MDM requires all employees to have PIN codes set on their phones.
Protect from inadvertent employee mistakes.
We recommend Elevate Security, Secure Code Warrior, and Symantec Data Loss Prevention.
Big Breaches: Cybersecurity Lessons for Everyone
Get in Touch
Interested in understanding what cybersecurity is all about, what failures have taken place in the field to date, and how they could have been avoided? This is the book for you. Questions? Contact us below.
get a free book chapter.
Subscribe to the mailing list to get the entire first chapter of Big Breaches: Cybersecurity Lessons for Everyone delivered to your inbox, absolutely free! (Free chapter on SolarWinds hack also coming soon!)