It is not surprising that every organization needs to have a business continuity plan in their back pocket, ready to use at a moment's notice. Business continuity is more than just having a single point in time daily backup; the need is for a full recovery that...
Blogs
Results From Your Threat & Vulnerability Assessment Are In: Now What?
When a CISO or IT leader chooses to have a cybersecurity assessment done, that decision starts with recognizing that an existing internal process or program might not be fully effective or complete. That conclusion isn’t always easy. Internal teams don’t always know...
PCI DSS v4.0 Deep Dive: Scoping Requirement 12.5.2
If your business processes, stores, or transmits credit card and cardholder data, you should be on your way to enacting changes needed for your organization’s compliance with PCI DSS v4.0 which goes into effect on March 31, 2024. Version 4.0 encompasses 13 new...
Unravelling the Contrasts Between Machine Learning, Deep Learning and Generative AI
In the past 6 months Generative AI has exploded, most notably via OpenAI’s “ChatGPT.” In recent years, the fields of Machine Learning (ML) and Deep Learning (DL) have gained significant attention and have become buzzwords in the technology industry (Generative AI is a...
EmpowHER 2023: Insights From an Inspiring Women in Leadership Panel
Converge held its third annual EmpowHER Women in Leadership event, hosted by Jessica Geis, VP of Client Experiences for Converge Technology Solutions. The inspiring event brought together a panel of remarkable women from diverse backgrounds to share their experiences,...
Pre-Implementation Checklist for Successful Database Activity Monitoring
Security teams use database activity monitoring (DAM) to see what is happening with their critical data assets and to detect anomalies that can indicate misuse, theft, or tampering. As a process, DAM involves “observing, identifying, and reporting a database’s...
Tips for Getting IAM Implementation Right
A well-known quote says a “rose by any other name would smell just as sweet.” That may be true for some things, but it leaves too much to chance for cybersecurity. Establishing known identities is crucial to securing users, data, and devices. Identity and access...
How Synching Managed Providers Leads to Better Results
If you work with third-party IT and cybersecurity service providers, you already know how they can help you hurdle the challenges and costs of sourcing, retaining, and training in-house teams. The ease and efficiency delivered by managed service providers (MSPs) and...