Cygna Labs
Book a Demo
shield

Strengthen your organization’s cybersecurity posture with software solutions from Cygna Labs

Windows Endpoint Security: Insights from Microsoft Summit

Windows Endpoint Security: Insights from Microsoft Summit

Update on Microsoft's Windows Endpoint Security Ecosystem Summit focused on vendor feedback, safe deployment practices, and balancing security needs with performance.

November 13, 2024

Morgan Holm

Changes Are Coming to the Microsoft Security Ecosystem

Changes Are Coming to the Microsoft Security Ecosystem

A faulty CrowdStrike update crashed 8.5M Windows systems globally, causing major outages. An estimated $10B impact prompts a Microsoft-led security summit to prevent this in the future.

September 06, 2024

Morgan Holm

What matters in a DDI solution? (Part 2)

What matters in a DDI solution? (Part 2)

DDI information is vital to cyberthreat investigations and leading DDI solutions offer differing approaches. Review key DDI cybersecurity requirements you should consider.

May 02, 2024

Timothy Rooney

How do you improve cybersecurity for your identity infrastructure? Part 3

How do you improve cybersecurity for your identity infrastructure? Part 3

Discover seamless recovery solutions for Active Directory & Entra ID (Azure AD). Cygna ensures swift rollback, granular recovery, & enhanced cybersecurity for your identity infrastructure.

April 16, 2024

Morgan Holm

How do you improve cybersecurity for your identity infrastructure? Part 2

How do you improve cybersecurity for your identity infrastructure? Part 2

In today's digital landscape, safeguarding identity systems is paramount to maintaining security within any organization. This blog post delves into the critical role of change auditing in monitoring and protecting Active Directory (AD) and Entra ID (Azure AD), essential components for managing and securing identities.

March 04, 2024

Morgan Holm

How do you improve cybersecurity for your identity infrastructure? Part 1

How do you improve cybersecurity for your identity infrastructure? Part 1

Active Directory (AD) entitlements play a pivotal role in safeguarding your organization, serving as the primary means for authentication and authorization. This blog post emphasizes the criticality of minimizing the attack surface by implementing delegated AD security, adhering to the principle of least privilege. Learn how to validate user access, identify high-risk permissions, and address the challenges of managing and hardening entitlements.

February 06, 2024

Morgan Holm

2023 Cybersecurity – Year in Review

2023 Cybersecurity – Year in Review

2023 has proven to be another chaotic year for cybersecurity with a resurgence in ransomware and extortion. Geopolitical conflicts have also resulted in an increase in attacks by state-based actors and sympathetic groups. Governing bodies are enacting new regulations and laws around cybersecurity.

December 15, 2023

Morgan Holm

categories