It’s Lynx’s mission to provide the diverse cybersecurity resources and tools companies need to demonstrate mature GRC practices that deliver measurable business value. As Lynx’s Senior Director Risk & Technology Services, Robyn Yaniero Marsi provides the...
Lynx Blog
October brings National Boss’s Day! Celebrating Our CEO, Gina Mahin
In honor of National Bosses Day this month, we wanted to share an article posted by Security Current about our boss here at Lynx! Gina Mahin, Chief Executive Officer, Lynx Technology Partners Gina Mahin is a problem solver. It’s just part of her DNA. She puts that...
Are Your Cyber Warriors Combat Ready?
Military strategy and training changes with every conflict and governmental paradigm shift. The only publication that has maintained relevance in the last 2500 years, is Sun Tzu’s The Art of War. I read this book only after I finished my military career, while I was...
What is the Business Case for MSSP?
Much has been written about the benefits of an MSSP, especially if you are a big organization. It allows for a consistent, centralized, and transparent view into your organization’s security platform. But, how do you decide if an “in-house” security management...
Case Study: Nuclear Industry
Background:The nuclear industry is struggling to meet compliance deadlines and find dedicated, knowledgeable resources who can be embedded into the existing workforce and function as a cohesive team. A typical nuclear plant contains thousands of Critical Digital...
Strategic Compromise Allows Attackers to Undermine Supply Chain
One-Fifth Of Enterprise Respondents Reported A Third-Party Breach according to Forrester's Top Cybersecurity Threats of 2018. Strategic Compromise Will Allow Attackers To Undermine Your Supply Chain Your partners are also under threat: 21% of global enterprise network...
Practice Cyber Combat on a Cyber Range
Cyber security is a skill based occupation. The only way to improve a cybersecurity expert skill set, is by accumulating hands-on experience. Similar to fighter pilots, who don’t often face the challenges and threats of the real world , training cybersecurity...
A Chat with Larry Newfield: Don’t Be an Information Hoarder
What are the most important principles in information security? Data Minimization and Frictionless Security. Data minimization is a real key. You can’t lose, nor hurt clients’ privacy if you are not maintaining things someone wants to steal. This also makes it easier...
GDPR: Europe Privacy Law That’s Changing the Landscape
For those of you with a keen eye or a particular attention to detail, you may have noticed privacy policy changes over the last few months on many popular websites. This is all part of the preparation for the General Data Protection Regulation (GDPR) that goes into...
Why Cybersecurity Should Be A Top Priority For Small Businesses
Every year, far too many businesses are compromised by cybercriminals, and each time, important data and sensitive information are accessed and exploited. In all situations, cybercriminals will use their best technology to steal data and even the finances of big...