
- May 20
Using Penetration Tests to Demonstrate ROI
You need to compete for dollars internally to fund your cybersecurity projects Use ROI on prior investments to build confidence for new...

- Mar 30
Canaries Provide Simple, Effective Cybersecurity
Canaries and Canary Tokens are a “Set It and Forget It” cybersecurity tool When a Canary is triggered, you know immediately that you have...

- Mar 18
In case you are asked: the new Cyber Incident Reporting Act
1. Many organizations are pulled into Critical Infrastructure 2. There's nothing to worry about just yet 3. Stay informed and be ready to...

- Feb 23
How the Government Can Guide Your Zero-Trust Approach
The U.S. Government issued requirements for agencies to meet zero-trust architecture standards by September 2024 Zero-Trust is vital as...

- Feb 11
Get Better Security Culture By Making It Personal
Traditional training approaches do a poor job improving employee behavior. Cybersecurity has a negative impact on culture because it is...

- Jan 17
Phishing Awareness is Important, But....
The field of cybersecurity training and awareness continues to put phishing at the forefront. For many organizations, phishing awareness...

- Dec 7, 2021
Misconfigurations for Office 365
Microsoft Office 365 offers so many compelling benefits, from the “work anywhere on anything” to automatic upgrades to subscription plans...

- Nov 15, 2021
5 Common Attacks That Dodge Your Firewall.
As your first line of defense, firewalls protect networks and systems against a range of cybersecurity threats coming from the internet...

- Oct 25, 2021
4 Pentest Paradoxes You Must Get Right
Penetration testing is the best way to know whether your network or applications have exploitable vulnerabilities. A pentest goes beyond...
- Oct 12, 2021
XDR, MDR, SOAR - Acronyms of Cybersecurity Detection & Response
One of the basic cybersecurity needs of businesses today is to detect threats to and within networks and effectively respond to threat...