Home
Blog
Risk Management

Risk Management articles

NIST CSF 2.0: A Closer Look

NIST CSF 2.0: A Closer Look

Cybersecurity is no longer a “nice to have.” It’s a necessity for businesses of all sizes in all industries – whether or not they have a full-scale security team to implement and manage the program. However, setting up a cybersecurity program is significant work, and keeping up with best practices is challenging, even for large organizations. That’s why public cybersecurity frameworks have been developed.  Cybersecurity frameworks are sets of standards and processes that businesses use to implement and manage security […]

Avatar photo
Charles Ho
Securing M&A with cybersecurity focus

Securing M&A with cybersecurity focus

Last year, mergers and acquisitions reached their lowest level in a decade but are now picking up again, says a report by PwC. However, the down market, geopolitical factors, and the immense growth in the use of digital technologies mean the approach to M&A deals will look very different in 2024. And cybersecurity tops the list of factors that need to be revisited. The 2020 pandemic drove companies towards digital transformation. This trend, which became central to many business models, […]

Avatar photo
Hwei Oh
4 Key Takeaways from the Change Healthcare Ransomware Incident

4 Key Takeaways from the Change Healthcare Ransomware Incident

It’s not often that we cover specific breaches, but sometimes one comes along that is so substantial and insightful that we believe it’s worth talking about. Such is the case with the recent Change Healthcare ransomware attack. This attack disrupted the entire U.S. healthcare system, forcing facilities to shut down, leaving patients without access to medication and care, and costing large hospitals and pharmacies upwards of $100 million per day. In many ways, the Change attack was nothing new. Bad […]

Avatar photo
Hwei Oh
What’s the Difference between XDR and EDR?

What’s the Difference between XDR and EDR?

The cybersecurity market is unfortunately loaded with acronyms that can make selecting the right security service confusing. Some of these acronyms overlap, while others have ambiguous meanings that differ depending on who’s providing them. The reason for this disparity in meanings is partly due to marketing hype—as a term becomes popular, marketing teams jump on the bandwagon, adding features to an existing service so they can say they have the same popular offering when, in reality, not much has changed. […]

Avatar photo
Charles Ho
Ensuring a Seamless MDR Integration: Tips for Your Security Infrastructure

Ensuring a Seamless MDR Integration: Tips for Your Security Infrastructure

Companies that use managed services to close key skills gaps experience a 2.4x better “performance premium” than companies that use no managed services, according to a PwC survey of 2,000 companies. This premium includes both revenue growth and profit margin. A significant skills gap, that affects two-thirds of all companies, is the perennial cybersecurity labor shortage. According to the most recent ISC2 Cybersecurity Workforce Study, the world needs 4 million cybersecurity professionals to close this gap, even though the global […]

Avatar photo
Hwei Oh

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2026
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber DPM++

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

7610