CONTACT US
HELP CENTER
Prosegur
  • xMDR Platform
    • xMDR Services
  • Solutions
    • Use cases
    • Services
  • Why Cipher
    • Success stories
  • About Us
    • Work with Us
  • Partners
  • Resources
  • Blog
  • Languages
    • EN
    • ES
    • BR
  • xMDR Platform
    • xMDR Services
  • Solutions
    • Use cases
    • Services
      • MSS
      • Protect
      • xMDR Services
      • RTS
      • GRC
        • PCI-DSS
  • Why Cipher
    • Success stories
      • CE Consulting | Success stories | Cipher
      • Prosegur | Success stories | Cipher
  • About Us
    • Work with Us
  • Partners
  • Resources
  • Blog
    • Cipher | Blog
Cybersecurity Blog | News and Updates

Cybersecurity News

How Managed Security Services Work

How Managed Security Services Work

More and more organizations are investing their security budgets into managed security services.

Cybersecurity

2025/05/14

From Legacy to Leading Edge: Navigating Digital Transformation with Cybersecurity Innovation at the Core

From Legacy to Leading Edge: Navigating Digital Transformation with Cybersecurity Innovation at the Core

Digital transformation—from systems that eliminate reams of paperwork to automation that accelerates workflows and cloud platforms that connect global teams in real time—is reshaping how organizations operate. The technologies driving digital transformation are designed for speed, efficiency, and competitive advantage.

Cybersecurity

2025/05/14

Extracting the Best Value From Your SIEM Tools

Extracting the Best Value From Your SIEM Tools

Security Information and Events Management (SIEM) tools manage, correlate, and analyze thousands of data and security events. In an environment of increasing vulnerabilities, it is critical to manage the security ecosystem using SIEM, collaborating to avoid intrusion episodes and irregular activities that put the company at risk.

Cybersecurity

2025/05/14

Criteria for Selecting Your Managed Security Services Provider (MSSP)

Criteria for Selecting Your Managed Security Services Provider (MSSP)

An MSSP brings a unique set of strengths to your overall security strategy.

Cybersecurity

2025/05/14

Ask These Questions When Evaluating SIEM Solutions

Ask These Questions When Evaluating SIEM Solutions

Modern IT infrastructure generates a wealth of data. A large or mid-size enterprise can generate petabytes and, in some cases, even exabytes of log and metadata. Hackers know this and intentionally target organizations that are sitting on data gold mines. And, depending on how the attacker plays their cards they can tap into this data with all types of social engineering tactics.

Cybersecurity

2025/05/14

Threat Brief: Ransomware Surge, State-Sponsored Espionage, and Evolving Malware Tactics

Threat Brief: Ransomware Surge, State-Sponsored Espionage, and Evolving Malware Tactics

The x63 Unit, Cipher’s global cyber intelligence team, has been closely tracking a surge in ransomware activity and the growing role of nation-state actors in cyber espionage.

Cybersecurity

2025/04/23

  • 5
  • 6
  • 7

LATEST POSTS

  • Cipher Cyber Threat Intelligence | Healthcare Services & Hospitals Weekly Brief – July 16, 2025

    Cipher Cyber Threat Intelligence | Healthcare Services & Hospitals Weekly Brief – July 16, 2025

    July 17, 2025

  • Cipher Cyber Threat Intelligence | Financial Services Weekly Brief – July 16, 2025

    Cipher Cyber Threat Intelligence | Financial Services Weekly Brief – July 16, 2025

    July 17, 2025

  • Cipher Cyber Threat Intelligence | Manufacturing Weekly Brief – July 16, 2025

    Cipher Cyber Threat Intelligence | Manufacturing Weekly Brief – July 16, 2025

    July 17, 2025

RELATED TAGS

  • xMDR
  • GRC
  • RTS

SOCIAL NETWORKS

Our Services

MSS

Protect

xMDR Services

RTS

GRC

Why Cipher

Success Stories

Use Cases

About Us

Work With Us

Help Center

FAQs

Contact Us

Resources

Blog

Press Room


© Copyright 2025 Cipher
  • Privacy Policy
  • Cookies Policy
  • Legal Notice
  • Change cookies preferences