1. Chief Information Security Officer (CISO) CISO-as-a-Service

    Join us for a discussion on the role of a Chief Information Security Officer (CISO) and the option of outsourcing the CISO role (CISO as a Service). Moderated by Daniel J. Haurey, President, Exigent Technologies with guests, Cybersecurity Regulatory Consultant, Jeff Miller, and Michael Feldman, Esq.…Read More

  2. Cybersecurity for Hospitals

    Hospitals are faced with the following challenges: Ad-hoc IT environments – Technology that is ordered by IT, clinicians, and administrators Internal politics – Finance, IT, human resources, and medical departments all have their own priorities and are competing for budget dollars for their own …Read More

  3. Welcome, Bruce Cheney!

    Join us in welcoming our newest addition to the team, Bruce! Bruce will be taking on the role of Senior Cybersecurity Analyst. In this role, Bruce will be providing penetration testing and vulnerability assessment services, and much more!…Read More

  4. Becoming a Channel Partner Has Its Perks!

    We like to welcome our new channel partners with a little taste of Cyberstone! If you are interested in becoming a partner and getting a real return on investment, contact our Channel Program Manager today! Jeff Miller jmiller@cyberstonesecurity.com 518.292.6568…Read More

  5. Spectre Returns

    By now, most people have heard about Spectre, a security vulnerability present in just about all modern-day processors, namely AMD and Intel.  If you wish to understand this vulnerability in more detail, you can do so at https://spectreattack.com/spectre.pdf. But these vulnerabilities have been fi…Read More

  6. Cyberstone helps companies with GDPR cybersecurity requirements

    GDPR compliance is a bear. Let’s face it. However, like anything else in life, if you whittle it down into more manageable chunks, it doesn’t have to be nearly as daunting. Cyberstone helps companies with the cybersecurity requirements under Article 32 which include: GDPR Requirement Cyberstone …Read More

  7. Three Critical Security Factors

    At midnight on July 13th, one of the largest clinical labs in the Unites States, LabCorp, fell victim to a Samsam ransomware attack conducted via brute force RDP attack. Thanks to LabCorp’s Security Operations Center (SOC), a data breach was prevented, and the ransomware was contained within 50 mi…Read More