[vc_row][vc_column][vc_empty_space height=”80″][vc_row_inner content_width=”grid”][vc_column_inner width=”1/3″][vc_single_image image=”6293″ img_size=”200×200″ style=”vc_box_circle_2″][vc_empty_space height=”25″][vc_column_text]Areas Of Expertise

[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”2/3″][vc_column_text]

Michael Swanagan, CISSP, CISA, CISM

Editor-In-Chief

[/vc_column_text][vc_empty_space height=”25″][vc_column_text]Michael is an Information Security Professional with 13 years of proven experience. He has experience leading and supporting security projects and initiatives in the healthcare, finance, and advertising industry.

 

Michael is the founder of CyberSwan Security Solutions, helping SMBs develop effective security strategies. Michael specializes in Data Loss Prevention, implementing and supporting DLP in medium and large global organizations. His expertise lies in providing a DLP road map to protect your confidential data at the endpoint, in transit or network, or data at rest.

 

Michael currently serves as editor-in-chief and technical writer for PurpleSec.

 

linkedin transparent image[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_empty_space height=”80″][/vc_column][/vc_row][vc_row content_width=”grid” css=”.vc_custom_1659281938962{background-color: #eadaff !important;}”][vc_column width=”1/4″][vc_empty_space height=”89″][vc_column_text]Recent Articles:[/vc_column_text][/vc_column][vc_column width=”3/4″][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1679973739313{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY

What Does A Virtual CISO Do? (Roles & Responsibilities Explained)

Is your organization in need of a cyber security leader? Find out how a Virtual CISO can manage your security strategy, oversee compliance, and provide staff augmentation.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1679366065298{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY

Top 10 Benefits Of A Virtual CISO

In this article, we’ll explore the importance of virtual CISOs, their roles and responsibilities, and the top 10 benefits they offer.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1679255612435{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY

How Much Does A Virtual CISO Cost? (Here’s What You Can Expect To Pay)

A Virtual CISO (vCISO) cost depends on factors such as expertise, business size, and experience, with pricing structures like retainers fees, hourly fees, project-based fees, and equity compensation.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1678228164124{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY

What Is A Virtual CISO? (& When You Should Hire One)

A virtual Chief Information Security Officer (vCISO) is an executive level security professional hired to guide the planning, development, implementation, and on going maintenance of a cyber security program.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1676569348417{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT

Vulnerability Assessment VS Penetration Testing: Key Differences Explained

The main difference between vulnerability assessments and penetration testing is that vulnerability assessments identify potential weaknesses in an organization’s IT infrastructure through high-level security scans. Penetration testing goes a step further by simulating real-world attacks to test the effectiveness of security measures and provide a more in-depth analysis of the organization’s security posture.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1675710417479{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT

What Is A Vulnerability Assessment? A Complete Guide For 2023

A vulnerability assessment is the process of identifying vulnerabilities and classifying risk in an infrastructure. The assessment also seeks to identify weaknesses in all connected systems to determine the most effective security measures.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1673364809732{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT

What Is Vulnerability Management? A Complete Guide For 2023

Vulnerability management is the process of identifying, prioritizing, and mitigating vulnerabilities in an organization’s systems and networks to reduce the risk of cyber attacks and protect against potential threats.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1670778297771{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT

Best Practices For Cloud Vulnerability Management In 2023

The top best practices for managing vulnerabilities in the cloud in 2023 include establishing KPIs, staying up to date with threat intelligence feeds, utilizing a vulnerability database repository, and leveraging automation, AI, and ML.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1667309145370{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT

Vulnerability & Patch Management Metrics: Top 10 KPIs to Measure Success

We help you identify and define the top key metrics that your organization can implement to track the progress and state of your vulnerability and patch management programs.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1666571418857{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]Social Engineering

How To Implement Cyber Security Awareness Training

Security awareness training is a formal process that seeks to educate its members about security practices as outlined in the organization’s corporate policies and procedures.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1666149215307{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]CYBER ATTACKS

How To Prevent Wireless Attacks

Wireless attacks can be prevented by Turning off unused networking features, Not broadcasting your SSID, Changing the default password and secure it with a strong password…

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1666038790417{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]CYBER ATTACKS

How To Prevent Network Attacks

Network attacks can be prevented by Using an Anti-virus solution, implementing a network monitoring tool, Avoiding trust relationships with unknown entities, Enabling cryptographic network protocols…

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1665770232294{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT

Why Vulnerability Management Reporting Fails (& How To Fix It)

If the report contains pages of vulnerabilities and is not clearly presented to your executive management team, it will be difficult to receive continued support for future investments.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1664141790352{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]VULNERABILITY MANAGEMENT

How To Reduce Your Average Time To Patch A Vulnerability

In this article, we will explore in detail the factors that determine the average time to patch, and review how PurpleSec’s vulnerability management solution can help reduce the average time to patch your vulnerabilities.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705789812{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SMALL BUSINESS

How To Build A Cyber Security Program For Small Business

There are 10 steps to building a cyber security program including conducting a security risk assessment, selecting a cyber security framework, developing a cyber security strategy, developing a risk management plan, reating security policies and controls, securing your network, data, and applications…

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705734446{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]NETWORK SECURITY

How To Develop & Implement A Network Security Plan

There are 8 steps to a network security plan which include: Understand your Business Model, Perform A Threat Assessment, Develop IT Security Policies & Procedures, Create A “Security-First” Company Culture, Define Incident Response, Implement Security Controls…

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705700933{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]NETWORK SECURITY

What Are The Different Types Of Network Security?

Network security is a combination of technologies, devices, and processes designed to protect an organization’s network infrastructure from unauthorized access, exploitation of its corporate resources, improper disclosure, and denial of services.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705662675{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]HEALTHCARE SECURITY

How To Perform A Successful HIPAA Risk Assessment

There are 5 main steps in performing a successful HIPAA risk assessment including defining key concepts and information flows, defining threats and vulnerabilities, conducting an initial risk assessment, developing control recommendations, and conducting a residual risk assessment.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705625951{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY

The 3 Types Of Security Controls (Expert Explains)

There are three main types of security controls including technical, administrative, and physical. Most controls in cyber security can be classifed as one of these three types.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705586594{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]CYBER ATTACKS

How To Prevent The Top Cyber Attacks In 2022

Cyber attacks and threats can be prevented by being aware of the various types of protocols, exploits, tools, and resources used by malicious actors.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705536004{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA SECURITY

The Best Data Loss Prevention Vendors (An Expert Review)

DLP expert Michael Swanagan reviews the best DLP software vendors on the market and provides his insights learned from over 13+ years of experience.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705495252{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SECURITY STRATEGY

NIST 800-171 Incident Reporting Compliance Requirements

Incident response is one of the 14 requirements outlined in the National Institute of Standards and Technology’s (NIST) Special Publication (SP) 800-171—Protecting Controlled Unclassified Information (CUI) in Nonfederal Information Systems and Organizations, and enforced by the U.S. Department of Defense (DoD).

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705451173{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]DATA SECURITY

7 Data Loss Prevention Best Practices & Strategies

Data Loss Prevention is a strategy that detects potential data breaches or data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint actions), in-motion (network traffic), and at rest (data storage).

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705404302{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SOCIAL ENGINEERING

What Is A Smishing Attack? (And How To Prevent It)

Smishing is a cyber attack that uses SMS text messages to mislead its victims into providing sensitive information to a cybercriminal.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705371216{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]SOCIAL ENGINEERING

What Is A Vishing Attack? (And How To Protect Against It)

Vishing attacks, or voice phishing, is a form of social engineering that attempts trick users into giving up personal or financial information.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705328000{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]MANAGED SECURITY

What Is Endpoint Detection And Response? (And Why It’s Important)

Endpoint detection and response (EDR) provides an additional layer of endpoint protection that is lacking with traditional anti-virus software.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705300947{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]MANAGED SECURITY

What Is A SIEM Solution? Benefits, Tools, & Strategies

Security Information and Event Management (SIEM) solutions are implemented by businesses to support the management of incidents and events produced by multiple data systems.

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][vc_column_text el_class=”boarder-shadow” css=”.vc_custom_1659705183332{padding-top: 25px !important;padding-right: 25px !important;padding-bottom: 25px !important;padding-left: 25px !important;background-color: #ffffff !important;}”]MANAGED SECURITY

Intrusion Detection VS Prevention Systems: What’s The Difference?

The main difference between an intrusion detection system (IDS) and an intrusion prevention system (IPS) is that an IDS is used to monitor a network, which then sends alerts when suspicious events on a system or network are detected…

Continue Reading >[/vc_column_text][vc_empty_space height=”64″][/vc_column][/vc_row][vc_row content_width=”grid” content_aligment=”center” css=”.vc_custom_1659294547465{background-color: #f7f7f7 !important;}”][vc_column][vc_empty_space height=”64″][vc_column_text]

Meet Our Security Experts

[/vc_column_text][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”6149″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Jason Firch

CEO / CMO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6188″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Josh Allen

CPO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6187″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Rich Selvidge

CISO[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6293″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Michael Swanagan

Technical Editor-In-Chief[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”19383″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Dalibor Gašić

Head Of Security Research[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”20202″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Dušan Trojanović

Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”20334″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Eva Georgieva

Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”19384″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Kenneth Thomas

Senior Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][vc_row_inner content_aligment=”center”][vc_column_inner width=”1/4″][vc_single_image image=”20410″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Liam Smith

Security Researcher[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”17868″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Eryk Waligora

Technical Writer[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][vc_single_image image=”6150″ img_size=”150×150″ alignment=”center”][vc_empty_space height=”25″][vc_column_text]Strahinja Stankovic

Technical Writer[/vc_column_text][vc_empty_space height=”25″][/vc_column_inner][vc_column_inner width=”1/4″][/vc_column_inner][/vc_row_inner][vc_empty_space height=”64″][/vc_column][/vc_row]