Contact

DayBlink joins Asana Partners Global Network

Vienna, VA April 14, 2021 DayBlink is proud to announce a partnership with Asana as part of the Asana Partners global network, linking DayBlink’s expertise in IT transformation and organizational change management with Asana’s technology to help organizations eliminate information silos and coordinate work with clarity, Organizations can use Asana to drive products to market,  […]

Read More
Created with Sketch.
Position Paper

Introduction to Metrics in Cybersecurity

“We need metrics. What are our key performance indicators? How do we know if we’re doing okay?” Cybersecurity leaders often ask these questions to their security teams to no avail — or worse, to a labyrinth of spreadsheets, incongruent datasets, and a rudimentary business intelligence layer sitting over the top of everything. Learn more about […]

Read More
Created with Sketch.
Position Paper

Corporate Diversity and Responses to the Black Lives Matter Movement

Analysis of the actions taken by America’s largest companies following the tragic killing of George Floyd Corporate Racism and the Black Lives Matter (BLM) Movement It is impossible to separate Corporate America from the foundation of oppression that it was built upon. After all, it was slavery that fueled America’s first big business – the […]

Read More
Created with Sketch.
Position Paper

Container Security – A Panacea Becomes a Vulnerability

Containers are helping enterprises develop, deploy, and deliver their applications faster — providing greater agility and efficiency over traditional software development methodologies. While adoption is increasing rapidly, container security challenges are slowing container deployments in production. DayBlink’s latest whitepaper focuses on how to find the highest value and easiest to implement container security initiatives so […]

Read More
Created with Sketch.
Position Paper

Passwords: The Human-defined Firewall

Why using ‘P@55w0rd’ may not be as effective as you think and how to set better passwords. In 2018, British Airways announced that a major security breach had exposed the personal data of 565,000 customers. The airline confirmed that over a two-week period, hackers were able to gain access to names, addresses, email addresses, credit […]

Read More
Created with Sketch.
Position Paper

Management Styles for a COVID World

COVID-19 has forced organizations to adapt to a new normal and face new pressing concerns. One of these priority concerns is how to optimally engage a recently transitioned remote workforce to boost team morale, drive efficiencies, and protect corporate culture. Although seemingly daunting, organizations can take actionable steps to lead from afar to ensure organizational […]

Read More
Created with Sketch.
Position Paper

Thinking Twice Before Using 2FA

Why Two-Factor Authentication is Quickly Becoming Obsolete 2 Factor Authentication (2FA), a form of Multi-factor Authentication (MFA) or Multi-Step Verification, adds another layer of security, supplementing the username and password model with a code that only a specific user has access to (typically sent to something they have immediately to hand). It has quickly become […]

Read More
Created with Sketch.
Position Paper

The Value of Documented Cybersecurity

Leveraging Proactive Documentation as a Cost-effective Solution The latter half of this past decade saw a record number of cybersecurity failures. The biggest breaches had headline-grabbing impacts and heavy financial costs. In 2017, The Equifax hack exposed the personal information of 143 million consumers, and Equifax itself lost $4 billion in stock market value by […]

Read More
Created with Sketch.
Position Paper

Building a Culture of Threat Modeling

The growth and complexity of modern cyber threats has led cyber-forward enterprises to implement practices that predict the techniques of their adversaries. Sophisticated information security teams are increasingly adopting proactive measures to understand the landscape of potential security threats and adapt accordingly. What is a Threat Model Threat modeling is a structured approach for reviewing […]

Read More
Created with Sketch.
Position Paper

Navigating the California Consumer Privacy Act

Passed into California law on June 28th, 2018, the CCPA is the strongest privacy legislation enacted in any state at the moment, giving more power to consumers in regards to their personal data. At its core, it aims to provide consumers with the right to know what information businesses collect about them, to tell a […]

Read More