Contact

Attracting and Retaining Talent through Career Empowerment

For the first time in nearly two decades, it is a job seeker’s market, and organizations are scrambling to reassess compensation packages and working arrangements to accommodate shifting employee priorities, win in the battle for talent, and avoid the “Great Resignation.” Fewer companies, however, have focused efforts on the longer-term strategies that are critical to […]

Read More
icon / insight Created with Sketch.
Insight

Is Zero Trust Attainable If You’re Not Google?

Zero Trust as a concept has become almost fashionable, if not perceived to be routine, with the consequence of setting an unrealistic expectation that it is a table-stakes capability for any organization serious about cybersecurity. In part this is driven by the natural erosion of the security perimeter as more users work from anywhere and […]

Read More
icon / insight Created with Sketch.
Insight

Driving DEE&I Outcomes with Data Analytics

Organizations generally recognize the strategic importance of Diversity, Equality, Equity, and Inclusion (DEE&I), but often struggle to drive tactical change in this space without analytical controls and frameworks to drive and monitor progress. Learn more about the analytical methods business leaders should implement to drive meaningful change within the workplace, in DayBlink’s latest insight About […]

Read More
icon / insight Created with Sketch.
Insight

A Brief Analysis of the May 2021 Cybersecurity Executive Order

In response to the recent ransomware attack on Colonial Pipeline, the Biden administration recently issued an executive order on “Improving the Nation’s Cybersecurity.” This document addresses a series of ongoing cybersecurity concerns brought to light by the recent ransomware attack. The latest insight from DayBlink’s Cybersecurity Center of Excellence provides a brief summary and analysis […]

Read More
Created with Sketch.
Position Paper

Introduction to Metrics in Cybersecurity

“We need metrics. What are our key performance indicators? How do we know if we’re doing okay?” Cybersecurity leaders often ask these questions to their security teams to no avail — or worse, to a labyrinth of spreadsheets, incongruent datasets, and a rudimentary business intelligence layer sitting over the top of everything. Learn more about […]

Read More
icon / insight Created with Sketch.
Insight

Threats, Risks, & Vectors – The Lexicon Problem

With the decision to divest a significant portion of their business, our client had to quickly review all balance sheet accounts to prepare for its eventual sale.  As part of their assessment, they identified thousands of outstanding unprocessed intercompany transactions.

Read More
Created with Sketch.
Position Paper

Container Security – A Panacea Becomes a Vulnerability

Containers are helping enterprises develop, deploy, and deliver their applications faster — providing greater agility and efficiency over traditional software development methodologies. While adoption is increasing rapidly, container security challenges are slowing container deployments in production. DayBlink’s latest position paper focuses on how to find the highest value and easiest to implement container security initiatives […]

Read More
Created with Sketch.
Position Paper

Passwords: The Human-defined Firewall

Why using ‘P@55w0rd’ may not be as effective as you think and how to set better passwords. In 2018, British Airways announced that a major security breach had exposed the personal data of 565,000 customers. The airline confirmed that over a two-week period, hackers were able to gain access to names, addresses, email addresses, credit […]

Read More
Created with Sketch.
Position Paper

Thinking Twice Before Using 2FA

Why Two-Factor Authentication is Quickly Becoming Obsolete 2 Factor Authentication (2FA), a form of Multi-factor Authentication (MFA) or Multi-Step Verification, adds another layer of security, supplementing the username and password model with a code that only a specific user has access to (typically sent to something they have immediately to hand). It has quickly become […]

Read More
Created with Sketch.
Position Paper

The Value of Documented Cybersecurity

Leveraging Proactive Documentation as a Cost-effective Solution The latter half of this past decade saw a record number of cybersecurity failures. The biggest breaches had headline-grabbing impacts and heavy financial costs. In 2017, The Equifax hack exposed the personal information of 143 million consumers, and Equifax itself lost $4 billion in stock market value by […]

Read More