We are Cyber Security Professionals.Information Security is not a problem you solve. It is a reality you manage and a risk you mitigate. Doing it successfully requires a vigilant, evolving effort by focused professionals. At Cybriant, we are those professionals. Let's Talk
What We Do
Testimonials & Featured Clients
“Cybriant has been instrumental in assisting us with leveraging SIEM architectures for global deployments. The company’s staff, including everyone from engineering to management roles, are great people with a tremendous amount of practical experience and knowledge in cyber security and applied technology space.
When partnering with Cybriant you are one step closer to your goal of being fully prepared to respond to any cybersecurity incident in a timely and effective manner.”
Director Global SOC, Global Claims Management Company
“Cybriant’s security risk assessment delivered the value I hoped to receive, a complete and concise document detailing what we needed to address and what our security priorities should be.
The assessment also provided an outside objective validation of our security needs which has aided our business leadership in making appropriate investments in our security program.”
VP of Information Technology, International Luxury Real Estate Company
“The resources I get from Cybriant are very knowledgeable and get my issues fixed. They have the experience to solve my immediate problem and can make recommendations on how to avoid similar issues in the future.”
Security Analyst, National Insurance Association
“Cybriant has been pivotal in supplying Managed Security Services to us and ensuring we have 24×7 monitoring and support. Response from Cybriant is always prompt and professional, and issues are remediated quickly.”
IT Services and Compliance Manager, Global Credit Bureau
Cybriant named Atlanta Business Chronicle Pacesetter, one of Atlanta’s Fastest-Growing Private Companies
Cybriant, a leader in cybersecurity services, was recently named the 22nd fastest growing private company in Atlanta by the Atlanta Business Chronicle.
The annual list ranks the top 100 qualifying companies based on their revenue and employee growth. See the full list here.
GDPR, or General Data Privacy Regulation, will come into force on 25 May 2018. GDPR requires organizations to maintain a plan to detect data breaches, regularly evaluate the effectiveness of security practices, and document evidence of compliance.
Andrew Hamilton has been selected to speak in the current IS Department speaker series at Kennesaw State University. In his presentation “Do what works, not what’s flashy,” he will discuss information overload, building a security foundation without hype, what to do and why it works.
Given different challenges facing security departments, security monitoring is vital. Security professionals now feel the deck is stacked against them as cybercriminals continue to attack. Many organizations are outsourcing to third-party vendors for faster and better detection.
The business sector was the leader for the number of breaches in March 2018 with 45 breaches. These are breaches that are confirmed through media sources and/or notifications from state governmental agencies. The medical/healthcare industry had the second highest percentage of recorded breaches at 21 percent (19 breaches).
Based on a recent study on the State of the SOC, security practitioners from enterprise organizations are overwhelmed by the sheer volume of alerts and investigations that require their attention.
Do you remember the Meltdown and Spectre vulnerabilities that exploited critical vulnerabilities in modern processors in January 2018? It turns out the patch that Microsoft created for Meltdown could be worse than the original Meltdown vulnerability. Ulf Frisk, a Swedish penetration tester, warns in his blog:
SamSam, a ransomware that hackers use in targeted attacks, strikes again – this time shutting down the City of Atlanta. Hackers using SamSam usually scan the Internet for computers with open RDP connections. Attackers break their way into large networks by brute-forcing these RDP endpoints and then spread to even more computers. Once they have a sufficiently strong presence on the network, attackers deploy SamSam and wait for the victim organization to either pay the ransom demand or boot them off their network.
PHI data or Protected Healthcare Information data is a big deal for security people in the healthcare industry. Protected health information (PHI) under the US law is any information about health status, provision of health care, or payment for health care that is created or collected by a Covered Entity (or a Business Associate of a Covered Entity) and can be linked to a specific individual.
Have you considered the legal ramifications of a potential data breach if your organization is hacked? Let’s look at the Equifax breach. The most recent headline was about the insider-trading charges that were brought against a former employee. He sold stock and options after learning of the massive data breach at the credit reporting agency. What’s next for Equifax?