Blog

Who’s Watching the Watchers?
One problem with many of the security solutions on the market today is that they brand themselves as the one tool that can accomplish security for you. But what happens when no one is...

Abacode’s CISO Speaks With CBS 10 Tampa Bay About Super Bowl Water Supply Hack
Watch this story on 10TampaBay.com Jeremy Rasmussen, Abacode's Chief Technology Officer & CISO spoke with CBS 10 Tampa Bay about the water supply hack in Oldsmar Florida, a...

APPROACH CYBERSECURITY LIKE IT’S THE SUPER BOWL, EVERYDAY – Abacode Guest Post on Security Systems News
Written by Jeremy Rasmussen, Chief Technology Officer & CISO at Abacode for Security Systems News. TAMPA BAY—This year’s Super Bowl will be very different from years past given...

The Myth of (Non)Compliance
The hard truth is, whether your industry demands it or not, you’re going to be compliant with something. If you’re not applying cybersecurity best practices, then you’re compliant with ZERO.

Identify a Framework
It is critical to follow an industry-accepted framework to ensure a comprehensive program when establishing your cybersecurity and compliance programs.

Establish a Risk Management Function
You must assign risk management responsibility and authority to either an individual or a department within your organization. It is a vital step in establishing a cybersecurity and...

Lessons Learned From FireEye and SolarWinds Breach
Let’s take a look at the FireEye breach, and I do so not in a critical manner at all, for I know that we are constantly targeted as well.

Abacode Provides Industry-Leading Compliance Services to Become an Industry MCCP
TAMPA BAY, Fla., Dec. 1, 2020 /PRNewswire/ -- Abacode, the fastest growing provider of cloud-based MSSP/MDR SOC-as-a-Service Security and Compliance services is proud to announce that...

Remote Desktop: You’re Opening the Floodgates for Hackers
Once is a fluke. Twice a pattern. But when you see something dozens of times, it’s a bona fide trend. Abacode has seen Remote Desktop Protocol (RDP, IANA port 3389) used in dozens of...

How to Use Your Planning Cycle to Reinforce Your Cybersecurity
Every organization has a planning and budgeting cycle. Planning is what enables organizations to prepare for the future, address and manage opportunities and threats, identify and...
Recent Comments