Blog

April 13, 2018
Understanding Risk Assessment for InfoSec Budgeting

[VIDEO] Understanding Risk Assessment for InfoSec Budgeting

Establishing common ground with the C-Suite and the Board is key to securing adequate funding for IT security investments. Easier said than done, right? Securing that […]
April 3, 2018
How Detection and Response Affect Risk Management

How Detection and Response Affect Risk Management

A HIMSS 2018 survey of healthcare IT CIOs and CISOs suggests that the health sector is beginning to treat information security as general risk management. Increasingly, […]
March 30, 2018
Critical Informatics Raises 2 Million

Critical Informatics Announces an Additional $2 Million of Funding

SEATTLE, March 27, 2018 — Critical Informatics, a leader in cybersecurity Managed Detection and Response (MDR) services, announced today the close of an additional $2 million of funding. […]
March 27, 2018
Meltdown Spectre - Risk Managers Guide_Critical Informatics

Meltdown and Spectre: The Risk Manager’s Guide

[AUTHOR UPDATE]: As per usual with technology stories, by the time we hit “Publish” on this post there was already another development brewing with the recent announcement […]
March 19, 2018

MDR vs. MSSP vs. SIEM – InfoSec Acronyms Explained

MDR, MSSP, SIEM, EDR, etc. — the world of managed IT security has far too many acronyms, each of which represent a different product or service. […]
March 12, 2018
Forensic Analysis of Digital Media

Forensic Analysis of Digital Media – 4 Methods Explained

Imagine your computer getting infected with malware or getting compromised, and you suspect evidence of a crime that you’d like to see prosecuted. Critical Informatics comes […]
March 6, 2018
8 Best Practices for Working Remotely

8 Best Practices for Working Remotely

Companies of all sizes are under attack. It is true that threat actors primarily attack large companies, but they may also target small and medium companies. […]
February 26, 2018
Securing Local Government

A 2-Step Approach to Securing Local Government

EDITOR’S NOTE: This is the second in a three-part series focused on information security and the public sector – more specifically, local government. In the first […]
February 21, 2018
Inside the Mind of a Threat Actor

[INFOGRAPHIC] Inside the Mind of a Threat Actor: Tactics, Techniques, and Procedures Explained

They lure their victims with the bait of a seemingly innocent email or landing page in an attempt to steal their user credentials.  And they only […]

Want more cybersecurity information?

Sign Up for Our Daily Cyber Security News Blast


We may also occasionally send you information about Critical Informatics products and solutions; you can unsubscribe at anytime if desired.