Greenlight Blog

The Threats Within

The Threats Within

by Jasmine Chennikara-Varghese Every organization struggles with managing and mitigating cyber threats both internal and external. Typically, more focus and resources are spent on fortifying perimeter security which provide sufficient protection to deter external...

A Black Eye Before Black Friday

A Black Eye Before Black Friday

Employee data continues to be a leading target for criminals and 60% of attacks are carried out by insiders. Despite this startling statistic, 61% of organizations don’t monitor privileged users more closely than regular users. And as retailers are gearing up this...

Your Health (Data) at Risk

Your Health (Data) at Risk

by Jasmine Chennikara-Varghese The health care industry has been aggressively using their resources to implement and leverage enabling technologies for health management. As the healthcare sector technology evolves, it is encompassing clinics and doctor’s offices,...

Trust No One

Trust No One

by Jasmine Chennikara-Varghese More organizations are moving to the Zero Trust Security model as a way to overcome the challenges of typical perimeter security. As the boundaries of the corporate cyber landscape blur, securing the perimeter becomes more difficult. ...

Verizon DBIR 2018

Verizon DBIR 2018

by Jasmine Chennikara-Varghese The 2018 Verizon Data Breach Investigation Report (DBIR), which was recently released, reminds us that security is an ongoing challenge against evolving attack vectors and threats. It also acts as an advisory to continually monitor and...

GDPR Is Almost Here… Are You Ready?

GDPR Is Almost Here… Are You Ready?

by Jasmine Chennikara-Varghese, Greenlight Technologies In less than three months, the European Union’s (EU) General Data Protection Regulation (GDPR) will take effect. The focus of GDPR is to strengthen and unify data protection for EU citizens. This impacts...

When SIEM Data Is Not Enough

When SIEM Data Is Not Enough

by Jasmine Chennikara-Varghese, Greenlight Technologies Security breaches are costly. Just ask Target, Equifax and dozens of other large organizations who have experienced data breaches in the past few years. To improve the ability to detect and respond to security...

Top 5 Breaches of 2017

Top 5 Breaches of 2017

As we wrap up 2017, the odds are in your favor that at some point your personal information was stolen in one of the 1,200+ breaches reported this year alone. The scariest part is that there are still countless breaches that haven’t been detected yet and corporations...