Saving Money AND Maturing Security? Tell Me How!

When it comes to mitigating risk in your organization, cyber security is one of the most important issues. Most of us have sat through painful sales pitches, where things are said like "100% secure." If you are like me, it is hard to contain the inherent eye-roll. We all know that security program maturity [...]

FocusPoint Proprietary Vetting Process

There are thousands of products in the industry today all vying for your attention. FocusPoint's proprietary vetting process helps companies find the best fit solution for their complex environment!

By |2018-08-08T20:55:58+00:00August 6, 2018||Comments Off on FocusPoint Proprietary Vetting Process

When Did Cyber Security Become All About Excess?

When I started in the IT industry I loved it. I had a chance to follow two passions – technology and helping companies become more effective. Things that used to take hours manually now could be done in seconds. Most of the companies that existed had a true passion early to provide value to [...]

Are Your Executives Engaged in CyberSecurity?

Many executive leaders are criticized for not caring about or understanding cybersecurity. This comes from the perception that they do not realize the true threat landscape, they are not allocating resources, and/or they are not talking about the topic on a regular basis. For many organizations, there are good reasons for this perceived behavior. [...]

Security Orchestration and Automation

When it comes to a successful security program, efficiency and incident response time are two key factors. Today's security teams are often understaffed and overworked. Tasked with using numerous disparate tools, many employees are struggling to prioritize incidents and determine what is important. Orchestration and automation tools streamline these processes, bringing together all your [...]

So Many Emails, So Little Time!

In-person technology collaboration is becoming a low priority. As a leader in technology, I very rarely respond to the plethora of emails, calls, mail that I receive from external sources. Especially in the cyber security space, I received upwards of 300 different interactions EVERYDAY. Anywhere from webinars, articles, sales material, even from reputable sources [...]