Contact

Asset Owner Identification Automation for Vulnerability Management

A major Communications & Media company faced a large number of long-lived vulnerabilities in their service delivery network for which the asset owner was unknown. Without an asset owner for whom to turn for remediation, each day the situation was going from bad to worse. Their existing manual ownership identification processes were hopelessly overwhelmed by […]

Read More
icon / insight Created with Sketch.
Insight

Securing the Hybrid Working World

As a result of Covid, a rapid organizational shift to a new way of working is well underway, and almost three years into this transformation, companies are still wrestling with the transition to a hybrid work environment. As we continue to learn more about the impacts of these recent organizational changes, leaders are now focused […]

Read More
icon / insight Created with Sketch.
Insight

Messy IT Asset Management: Unorganized Closet or Fire Starter?

IT Asset Management is often the un-owned, unwanted, and un-optimized major initiative that large technology organizations continue to struggle with — especially in a modern ecosystem of hybrid infrastructure, legacy systems, microservices, and DevOps teams. Is this simply a commonly ignored housekeeping exercise or is it a signal of a huge cybersecurity risk? The latest […]

Read More
icon / insight Created with Sketch.
Insight

A Summary of the U.S. Department of Treasury’s Report “The Financial Services Sector’s Adoption of Cloud Services”

The U.S. Department of Treasury recently released “The Financial Service’s Sector’s Adoption of Cloud Services” (“Cloud Report”), outlining key issues facing the U.S. financial services industry as it adopts cloud services. Forty-eight organizations, including global banks, participated in the “open discussion without attribution focused on the current and future state of cloud adoption, viewpoints on […]

Read More
icon / insight Created with Sketch.
Insight

Four Cybersecurity Trends to Watch in 2023

As 2023 approaches, it is time to look into our crystal ball for trends that will define cybersecurity over the next year. With many CEOs expecting possible economic downturn in the next 12 months, it’s impossible to not consider the larger macro environment when making these predictions. While recessions typically lead to cost-cutting across companies, […]

Read More
Created with Sketch.
Position Paper

Observability offers promising benefits. Don’t dismiss it as a buzzword.

Modern application systems are significantly more complex than they were a decade ago. Organizations aiming to scale effectively have adopted distributed microservice ecosystems in lieu of monolithic architectures. Microservices allow organizations to deliver efficiently and decrease time to market. This is great for the customer, but innovation often comes with a tradeoff. So where is […]

Read More
icon / insight Created with Sketch.
Insight

DEFCON 30 Recap

DEFCON is an experience that covers a breadth of security topics from Lock Picking to International Cyber Policy and Security. After spending a jam-packed weekend in Las Vegas, the DayBlink Consulting Cybersecurity Group gathered key takeaways with security practitioners and IT executives in mind. Read more here: Zachary White on Medium About the Authors Zachary […]

Read More
icon / insight Created with Sketch.
Insight

Summary of the January 2022 Memo on Federal Zero Trust Strategy

Given the vast amount of data the United States maintains, the federal government has a unique responsibility to secure its own IT infrastructure to minimize the potential harm from a cyber intrusion. With persistent and inventive threats from bad actors in mind, the Biden Administration announced it is moving toward a Federal Zero Trust Architecture […]

Read More
Created with Sketch.
Media & Events

Healthcare Companies are Not Immune to Zero Day Attacks

In Q4 2021, the Department of Health and Human Services (HHS) published a briefing that detailed the concept of Zero Day attacks and their recent impact on the Healthcare and Public Health sector (HPH). As one of the 16 critical infrastructure sectors designated by Presidential Policy Directive 21, implementing advanced detection and protection tactics to […]

Read More
icon / insight Created with Sketch.
Insight

Technical Controls as a Driver of Cyber Culture

Most sophisticated cybersecurity organizations have embraced technical controls as a management mechanism. Some organizations have even begun mandating their adoption. Forced technical controls, if integrated appropriately into the culture, can dramatically increase cyber defense capabilities as well as combat employees’ inherent resistance to change. While proactively initiating change may seem counterintuitive to creating a strong […]

Read More