Contact

Asset Owner Identification Automation for Vulnerability Management

A major Communications & Media company faced a large number of long-lived vulnerabilities in their service delivery network for which the asset owner was unknown. Without an asset owner for whom to turn for remediation, each day the situation was going from bad to worse. Their existing manual ownership identification processes were hopelessly overwhelmed by […]

Read More
icon / insight Created with Sketch.
Insight

How to Build Culture in a Hybrid Work Environment

As we continue to operate in a hybrid model, organizations are stuck. Virtual is not providing a space for efficient working conditions nor growing company culture, and going into the office is creating a disgruntled employee base. While both options are optimal for some, the availability of choice has created friction. Many have landed on […]

Read More
icon / insight Created with Sketch.
Insight

SOC Automation: Trends and Best Practices

Automation has become essential in modern SOCs to ensure efficient detection, remediation, and response to security incidents. Successful automation, however, requires a strategic approach that incorporates both technology and human collaboration. Identifying strategic elements in advance can increase your probability of success. Learn more here: Josh Tupper on Medium. About the Authors Josh Tupper is […]

Read More
icon / insight Created with Sketch.
Insight

The IAM Iceberg: Navigating IAM’s Depths Amidst the Temptation of Tools

A quick Google search using keywords like “how to scale identity and access” or “how to securely manage identity and access” will yield a plethora of results addressing common Identity and Access Management (IAM) challenges. Notably, many of these results are dominated by companies that offer enterprise IAM products such as SailPoint and Okta. Their […]

Read More
icon / insight Created with Sketch.
Insight

Identifying and Addressing Top Automation Opportunities in Fortune 500 Companies

Harnessing automation to perform tasks that traditionally require human intervention is more than a passing trend, it’s a transformative shift. Successful automation can lead to significant financial and operational benefits, including a decrease in operational costs, fewer errors, and an optimized allocation of resources. Learn more about the five criteria business leaders should examine to […]

Read More
icon / insight Created with Sketch.
Insight

GitHub — a Dangerous Platform if your house isn’t in order

Every year, hacker summer camp (aka DEFCON, Black Hat, BSides) arrives in a flurry of anticipation, presentations, and great ideas that often take reflection to determine how best to implement in our daily lives. Each year, in addition to new skills and information, we look for themes that may come to dominate the security world […]

Read More
icon / insight Created with Sketch.
Insight

Prioritizing the Virtual Private Cloud for PHI in Healthcare

Cloud infrastructure systems present an incredible opportunity for healthcare organizations to not only greatly save on costs, but also securely transfer patient data faster and more securely (when done right). In DayBlink Consulting’s new thought piece, Christa Zubic assesses the various options healthcare organizations can pursue in upgrading their cloud offerings, specifically focusing on how […]

Read More
icon / insight Created with Sketch.
Insight

IAM in the Cloud

Scaling the capabilities of Identity and Access Management (IAM) teams now requires not only meeting requirements for potentially hundreds of applications and thousands of identity profiles, but also multiple infrastructure ecosystems. That ecosystem gets further complicated with hybrid and multi-cloud environments. Traditional strategic advice is often given as “move towards a zero trust network” or, […]

Read More
icon / insight Created with Sketch.
Insight

Top 4 Cloud Risks of 2023 & A Cloud Security Framework to Address Them

Businesses establishing themselves in the cloud invest in services that optimize processes and increase productivity. Cloud implementation trends are moving towards multi-platform environments and microservice architecture, and security professionals are contending with cloud threats that exploit gaps in the growing attack surface. The DayBlink Consulting Cybersecurity Group has identified key themes and outlined a high-level […]

Read More
icon / insight Created with Sketch.
Insight

2023 Cloud Threats and Vulnerabilities Summit Recap

The Cloud Security Alliance (CSA) recently held its Cloud Threats and Vulnerabilities Summit, featuring prominent speakers across 20 sessions and panels. Speakers highlighted the main systemic risks within the cloud ecosystem and provided recommendations on how to best defend against malicious actors. DayBlink Consulting’s Cybersecurity Group gathered the following key takeaways and their implications for […]

Read More