
Splunk is an Amazing SIEM – So Why Are Some Clients Unhappy?
Here are some common Splunk mistakes, plus how to maximize your Splunk subscription with BlueVoyant’s expertise and services Splunk has been a market leader for […]

Gartner Highlights Four Steps CIOs Can Take to Mitigate IT Employee Fatigue
Eight out of 10 CIOs Don’t Make Fatigue a Regular Part of Conversations About Business Technology Initiatives Employees are dealing with an unprecedented amount of […]

Is Data Your Weakest Link?
If you’re used to talking about data security, you’re probably used to hearing about structured data. Many solutions and mechanisms exist to protect structured data […]

How User and Entity Behavior Analytics Helps Cybersecurity
Cyberattacks are increasingly sophisticated, making traditional digital security tools insufficient to protect organizations from malicious actors. In 2015, Gartner defined a category of solutions called […]

European Security Spending to Grow 10.6% in 2023, Driven by the Financial Sector
Growing security needs, new regulations, and the increasing risk of ransomware attacks due to the current geopolitical situation continue to drive European security spending. According […]

Understanding Cyber Threats in Transport
The European Union Agency for Cybersecurity (ENISA) publishes its first cyber threat landscape report dedicated to the transport sector. This new report maps and analyses […]

Emerging External Cyber Defense Trends
One of the primary cybersecurity challenges faced by organizations today is an expansion of the digital ecosystem to include external exposure like third-party connections and […]

Gartner Survey Reveals Less Than Half of Data and Analytics Teams Effectively Provide Value to the Organisation
Gartner Analysts Discuss How Presence, Persistence and Performance Drive Business Value at the Gartner Data & Analytics Summit 2023, 22-24 May in London, UK Less […]

SAP Patch Day: March 2023
Critical Vulnerabilities patched in SAP NetWeaver AS ABAP / Java and in SAP BusinessObjects Highlights of March SAP Security Notes analysis include: March Summary—Twenty-one new […]

Key Factors That Drive Managed Detection and Response Engagement
As organizations conduct their annual cybersecurity planning, Managed Detection and Response (MDR) services are becoming table stakes for any mature cybersecurity program. With new and […]

Don’t Gamble With Your Company’s Data Security
In the world of data security, there’s no shortage of sinister actors waiting for the opportunity to strike. Just like in a game of poker, […]

The Bug Report – February 2023 Edition
Why am I here? Welcome back to the Bug Report! For those in the audience unfamiliar with our shtick, we compile a shortlist of the […]

Building Trust in the Supply Chain with Cyber Resiliency
When it comes to designing or improving upon your organization’s security program, one key area to focus on and include is cyber resilience. Either as […]

National Cybersecurity Strategy & Commercial Software Security
A Bold Step Forward to Incentivize Software Providers to Build More Secure Solutions One of the boldest proposals of the new National Cybersecurity Strategy by […]

Lessons Learned From the Latest Supply Chain Breaches
Uber, LastPass, DoorDash, and more have all reportedly been recently affected by a breach on a vendor, which led to negative publicity for these companies. […]

NIST Retires SHA-1 Cryptographic Algorithm
The venerable cryptographic hash function has vulnerabilities that make its further use inadvisable. The SHA-1 algorithm, one of the first widely used methods of protecting […]

Law Firms are Raising the Bar on Cybersecurity
Managed Detection and Response (MDR) Coupled With Microsoft Siem (Sentinel) Plus XDR Provides Law Firms With Streamlined and Privacy-Centric Cybersecurity Options for 2023 Corresponding with […]

A Guide to Modern File-Level Encryption
What is file-level encryption? File-level encryption has long been a common technique to protect file confidentiality and sensitive data at rest. It ensures that selected […]