Reduce Business Risk for Credit Unions

Reduce Business Risk for Credit Unions

I recently listened to an interview with two CEOs of mid-sized credit unions. The interviewer asked them about what keeps them up at night. Without a pause, they both answered, “being the victim of a cyberattack.” Their concerns are well placed—the risks...
First Big Phishing Campaign of 2020

First Big Phishing Campaign of 2020

What laid the foundation for the first big phishing campaign of 2020? So far this year, people around the world have been glued to their computers and mobile devices for updates on coronavirus infection and fatality statistics. A quick Google Trends search for the...
ACET – Reality Sets In for Many More Credit Unions

ACET – Reality Sets In for Many More Credit Unions

In 2017, the National Credit Union Administration launched the ACET—Automated Cybersecurity Examination Tool—to provide a cybersecurity assessment tool for determining the security posture of credit unions.  Through 2018 and 2019, the focus was on credit unions with...
MDR, MSSP, EDR – What’s the Difference?

MDR, MSSP, EDR – What’s the Difference?

Many organizations need to rely in part, and often heavily, on third-party cybersecurity partners to protect their organizations. Given the growing sophistication of attacks, ever-escalating frequency, and the wide range of cybersecurity knowledge now needed, it is...
UTM Devices – Avoid Black Magic Scoping

UTM Devices – Avoid Black Magic Scoping

Since the Dark Ages, organizations have contacted wizards to help determine the security devices they need to defend themselves against the evils trying to penetrate their fortresses. While wizards and other purveyors of the dark arts might have been sufficient in the...
The Impact of Dwell Time

The Impact of Dwell Time

Dwell time, also known as breach detection gap, can be the most important determinant of the impact your company will experience from a cyberattack. What is dwell time or breach detection gap? In simple terms, they represent the amount of time between a system breach,...

Managed Security Services

Your around the clock SOC.

Managed Endpoint Detection and Response

Some attacks will succeed. Don’t worry—we have you.

Managed Detection and Response

Augment your IT team using our expertise and the latest technologies.

Email Protection Suite

Defending against the leading attack vector.

Cloud Email and Collaboration

More than ever, the cloud is essential.

Incident Response Readiness

When a breach occurs, you’ll be ready.

Compliance & Risk Services

Take the next steps on your cybersecurity maturity journey.

Revisiting Cybersecurity’s Delicate Balance

Learn How CISOs Are Rebalancing Prevention, Detection, and Response for Stronger Cyber Defenses.

Financial Services

We comply with the same regulations you do.

Healthcare

Affordable defenses for a sector under attack.

Retail

SilverSky stands between cybercriminals and your customers’ data.

Revisiting Cybersecurity’s Delicate Balance

Learn How CISOs Are Rebalancing Prevention, Detection, and Response for Stronger Cyber Defenses.

ACET

Automated Cybersecurity Examination Tool

HIPAA

Health Insurance Portability and Accountability Act

PCI DSS

Payment Card Industry Data Security Standard

FFIEC

Federal Financial Institutions Examination Council

GLBA

Gramm-Leach-Bliley Act

Revisiting Cybersecurity’s Delicate Balance

Learn How CISOs Are Rebalancing Prevention, Detection, and Response for Stronger Cyber Defenses.

Resources

Articles, guides, ebooks, tools, on-demand webinars, case studies, and more. Explore a range of topics.

Events & Webinars

Upcoming webinars, conferences, and trade shows.

Revisiting Cybersecurity’s Delicate Balance

Learn How CISOs Are Rebalancing Prevention, Detection, and Response for Stronger Cyber Defenses.

About Us

Trusted cybersecurity for an uncertain world.

Careers

Looking to join the fight against cybercriminals?

Security Management Console

Comprehensive customer portal for state of devices, reports for compliance, support tickets, and more.

Revisiting Cybersecurity’s Delicate Balance

Learn How CISOs Are Rebalancing Prevention, Detection, and Response for Stronger Cyber Defenses.

Become a Partner

Will you join us in the fight against cybercrime?

Revisiting Cybersecurity’s Delicate Balance

Learn How CISOs Are Rebalancing Prevention, Detection, and Response for Stronger Cyber Defenses.