Michael Swanagan, CISSP, CISA, CISM
Editor-In-Chief
[/vc_column_text][vc_empty_space height=”25″][vc_column_text]Michael is an Information Security Professional with 13 years of proven experience. He has experience leading and supporting security projects and initiatives in the healthcare, finance, and advertising industry.
Michael is the founder of CyberSwan Security Solutions, helping SMBs develop effective security strategies. Michael specializes in Data Loss Prevention, implementing and supporting DLP in medium and large global organizations. His expertise lies in providing a DLP road map to protect your confidential data at the endpoint, in transit or network, or data at rest.
Michael currently serves as editor-in-chief and technical writer for PurpleSec.
[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space height=”80″][/vc_column][/vc_row][vc_row content_width=”grid” css=”.vc_custom_1659281938962{background-color: #eadaff !important;}”][vc_column width=”1/4″][vc_empty_space height=”89″][vc_column_text]Recent Articles:[/vc_column_text][/vc_column][vc_column width=”3/4″][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1679973739313{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
What Does A Virtual CISO Do? (Roles & Responsibilities Explained)
Is your organization in need of a cyber security leader? Find out how a Virtual CISO can manage your security strategy, oversee compliance, and provide staff augmentation.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1679366065298{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
Top 10 Benefits Of A Virtual CISO
In this article, we’ll explore the importance of virtual CISOs, their roles and responsibilities, and the top 10 benefits they offer.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1679255612435{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
How Much Does A Virtual CISO Cost? (Here’s What You Can Expect To Pay)
A Virtual CISO (vCISO) cost depends on factors such as expertise, business size, and experience, with pricing structures like retainers fees, hourly fees, project-based fees, and equity compensation.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1678228164124{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
What Is A Virtual CISO? (& When You Should Hire One)
A virtual Chief Information Security Officer (vCISO) is an executive level security professional hired to guide the planning, development, implementation, and on going maintenance of a cyber security program.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1676569348417{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
Vulnerability Assessment VS Penetration Testing: Key Differences Explained
The main difference between vulnerability assessments and penetration testing is that vulnerability assessments identify potential weaknesses in an organization’s IT infrastructure through high-level security scans. Penetration testing goes a step further by simulating real-world attacks to test the effectiveness of security measures and provide a more in-depth analysis of the organization’s security posture.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1675710417479{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
What Is A Vulnerability Assessment? A Complete Guide For 2023
A vulnerability assessment is the process of identifying vulnerabilities and classifying risk in an infrastructure. The assessment also seeks to identify weaknesses in all connected systems to determine the most effective security measures.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1673364809732{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
What Is Vulnerability Management? A Complete Guide For 2023
Vulnerability management is the process of identifying, prioritizing, and mitigating vulnerabilities in an organization’s systems and networks to reduce the risk of cyber attacks and protect against potential threats.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1670778297771{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
Best Practices For Cloud Vulnerability Management In 2023
The top best practices for managing vulnerabilities in the cloud in 2023 include establishing KPIs, staying up to date with threat intelligence feeds, utilizing a vulnerability database repository, and leveraging automation, AI, and ML.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1667309145370{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
Vulnerability & Patch Management Metrics: Top 10 KPIs to Measure Success
We help you identify and define the top key metrics that your organization can implement to track the progress and state of your vulnerability and patch management programs.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1666571418857{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]Social Engineering
How To Implement Cyber Security Awareness Training
Security awareness training is a formal process that seeks to educate its members about security practices as outlined in the organization’s corporate policies and procedures.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1666149215307{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]CYBER ATTACKS
How To Prevent Wireless Attacks
Wireless attacks can be prevented by Turning off unused networking features, Not broadcasting your SSID, Changing the default password and secure it with a strong password…
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1666038790417{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]CYBER ATTACKS
How To Prevent Network Attacks
Network attacks can be prevented by Using an Anti-virus solution, implementing a network monitoring tool, Avoiding trust relationships with unknown entities, Enabling cryptographic network protocols…
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1665770232294{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
Why Vulnerability Management Reporting Fails (& How To Fix It)
If the report contains pages of vulnerabilities and is not clearly presented to your executive management team, it will be difficult to receive continued support for future investments.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1664141790352{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT
How To Reduce Your Average Time To Patch A Vulnerability
In this article, we will explore in detail the factors that determine the average time to patch, and review how PurpleSec’s vulnerability management solution can help reduce the average time to patch your vulnerabilities.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705789812{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SMALL BUSINESS
How To Build A Cyber Security Program For Small Business
There are 10 steps to building a cyber security program including conducting a security risk assessment, selecting a cyber security framework, developing a cyber security strategy, developing a risk management plan, reating security policies and controls, securing your network, data, and applications…
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705734446{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]NETWORK SECURITY
How To Develop & Implement A Network Security Plan
There are 8 steps to a network security plan which include: Understand your Business Model, Perform A Threat Assessment, Develop IT Security Policies & Procedures, Create A “Security-First” Company Culture, Define Incident Response, Implement Security Controls…
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705700933{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]NETWORK SECURITY
What Are The Different Types Of Network Security?
Network security is a combination of technologies, devices, and processes designed to protect an organization’s network infrastructure from unauthorized access, exploitation of its corporate resources, improper disclosure, and denial of services.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705662675{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]HEALTHCARE SECURITY
How To Perform A Successful HIPAA Risk Assessment
There are 5 main steps in performing a successful HIPAA risk assessment including defining key concepts and information flows, defining threats and vulnerabilities, conducting an initial risk assessment, developing control recommendations, and conducting a residual risk assessment.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705625951{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
The 3 Types Of Security Controls (Expert Explains)
There are three main types of security controls including technical, administrative, and physical. Most controls in cyber security can be classifed as one of these three types.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705586594{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]CYBER ATTACKS
How To Prevent The Top Cyber Attacks In 2022
Cyber attacks and threats can be prevented by being aware of the various types of protocols, exploits, tools, and resources used by malicious actors.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705536004{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA SECURITY
The Best Data Loss Prevention Vendors (An Expert Review)
DLP expert Michael Swanagan reviews the best DLP software vendors on the market and provides his insights learned from over 13+ years of experience.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705495252{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY
NIST 800-171 Incident Reporting Compliance Requirements
Incident response is one of the 14 requirements outlined in the National Institute of Standards and Technology’s (NIST) Special Publication (SP) 800-171—Protecting Controlled Unclassified Information (CUI) in Nonfederal Information Systems and Organizations, and enforced by the U.S. Department of Defense (DoD).
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705451173{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA SECURITY
7 Data Loss Prevention Best Practices & Strategies
Data Loss Prevention is a strategy that detects potential data breaches or data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint actions), in-motion (network traffic), and at rest (data storage).
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705404302{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SOCIAL ENGINEERING
What Is A Smishing Attack? (And How To Prevent It)
Smishing is a cyber attack that uses SMS text messages to mislead its victims into providing sensitive information to a cybercriminal.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705371216{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SOCIAL ENGINEERING
What Is A Vishing Attack? (And How To Protect Against It)
Vishing attacks, or voice phishing, is a form of social engineering that attempts trick users into giving up personal or financial information.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705328000{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]MANAGED SECURITY
What Is Endpoint Detection And Response? (And Why It’s Important)
Endpoint detection and response (EDR) provides an additional layer of endpoint protection that is lacking with traditional anti-virus software.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705300947{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]MANAGED SECURITY
What Is A SIEM Solution? Benefits, Tools, & Strategies
Security Information and Event Management (SIEM) solutions are implemented by businesses to support the management of incidents and events produced by multiple data systems.
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705183332{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]MANAGED SECURITY
Intrusion Detection VS Prevention Systems: What’s The Difference?
The main difference between an intrusion detection system (IDS) and an intrusion prevention system (IPS) is that an IDS is used to monitor a network, which then sends alerts when suspicious events on a system or network are detected…
Continue Reading >[/vc_column_text][vc_empty_space height=”64″][/vc_column][/vc_row][vc_row content_width=”grid” content_aligment=”center” css=”.vc_custom_1659294547465{background-color: #f7f7f7 !important;}”][vc_column][vc_empty_space height=”64″][vc_column_text]
Meet Our Security Experts
[/vc_column_text][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”6149″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Jason FirchCEO / CMO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6188″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Josh Allen
CPO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6187″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Rich Selvidge
CISO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6293″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Michael Swanagan
Technical Editor-In-Chief[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”19383″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Dalibor Gašić
Head Of Security Research[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”20202″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Dušan Trojanović
Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”20334″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Eva Georgieva
Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”19384″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Kenneth Thomas
Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”20410″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Liam Smith
Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”17868″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Eryk Waligora
Technical Writer[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6150″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Strahinja Stankovic
Technical Writer[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][/vc_column][/vc_row]