Contact

Asset Owner Identification Automation for Vulnerability Management

A major Communications & Media company faced a large number of long-lived vulnerabilities in their service delivery network for which the asset owner was unknown. Without an asset owner for whom to turn for remediation, each day the situation was going from bad to worse. Their existing manual ownership identification processes were hopelessly overwhelmed by […]

Read More
icon / insight Created with Sketch.
Insight

A Framework for Change

How to Improve Diversity, Equality, Equity, and Inclusion at your Organization In order to unpack deep-rooted, systemic biases, organizations must challenge the status quo by taking an active role in leading change. While these actions are driven by organizations, the case for change is built through education and buy-in of individuals. In order to drive […]

Read More
Created with Sketch.
Position Paper

Corporate Diversity and Responses to the Black Lives Matter Movement

Analysis of the actions taken by America’s largest companies following the tragic killing of George Floyd Corporate Racism and the Black Lives Matter (BLM) Movement It is impossible to separate Corporate America from the foundation of oppression that it was built upon. After all, it was slavery that fueled America’s first big business – the […]

Read More
Created with Sketch.
Position Paper

Container Security – A Panacea Becomes a Vulnerability

Containers are helping enterprises develop, deploy, and deliver their applications faster — providing greater agility and efficiency over traditional software development methodologies. While adoption is increasing rapidly, container security challenges are slowing container deployments in production. DayBlink’s latest position paper focuses on how to find the highest value and easiest to implement container security initiatives […]

Read More
icon / insight Created with Sketch.
Insight

“D&I” is Only Half of the Equation

Given the recent social challenges in our country, many organizations are turning attention to their Diversity & Inclusion programs with renewed focus. Improvements and action plans are beginning to take shape, from new employee groups and open forum discussions to seminars on implicit bias and training on microaggressions. However, few organizations recognize the breadth of […]

Read More
Created with Sketch.
Position Paper

Passwords: The Human-defined Firewall

Why using ‘P@55w0rd’ may not be as effective as you think and how to set better passwords. In 2018, British Airways announced that a major security breach had exposed the personal data of 565,000 customers. The airline confirmed that over a two-week period, hackers were able to gain access to names, addresses, email addresses, credit […]

Read More
Created with Sketch.
Position Paper

Management Styles for a COVID World

COVID-19 has forced organizations to adapt to a new normal and face new pressing concerns. One of these priority concerns is how to optimally engage a recently transitioned remote workforce to boost team morale, drive efficiencies, and protect corporate culture. Although seemingly daunting, organizations can take actionable steps to lead from afar to ensure organizational […]

Read More
icon / insight Created with Sketch.
Insight

COVID-19 Impact on Financial Planning & Analysis

The impacts of COVID-19 have catalyzed businesses to rethink current operations and unlock enterprise value by improving financial processes. The U.S. economy is projected to contract by nearly 6% in 2020 due to the coronavirus pandemic, twice the 2.9% contraction of the 2008 meltdown. Successful organizations thrive during economic downturns due to preparation and rapid […]

Read More
Created with Sketch.
Position Paper

Thinking Twice Before Using 2FA

Why Two-Factor Authentication is Quickly Becoming Obsolete 2 Factor Authentication (2FA), a form of Multi-factor Authentication (MFA) or Multi-Step Verification, adds another layer of security, supplementing the username and password model with a code that only a specific user has access to (typically sent to something they have immediately to hand). It has quickly become […]

Read More
Created with Sketch.
Position Paper

The Value of Documented Cybersecurity

Leveraging Proactive Documentation as a Cost-effective Solution The latter half of this past decade saw a record number of cybersecurity failures. The biggest breaches had headline-grabbing impacts and heavy financial costs. In 2017, The Equifax hack exposed the personal information of 143 million consumers, and Equifax itself lost $4 billion in stock market value by […]

Read More