The Anatomy of Business Email Compromise (BEC)
Business email compromise (BEC) is an effective cyberattack that uses deception and impersonation to steal large sums of money from...
Read More
The 7 Phases of an Incident Response Plan
Interview with Eric Vanderburg - President How to Write an Effective Cyber Incident Response Plan In a previous blog, we...
Read More
Preparing for CMMC: How to Manage Your Digital Supply Chain Risk
The Cybersecurity Maturity Model Certification (CMMC) is reshaping the way organizations manage and protect their digital supply chains. As companies...
Read More
Critical Metaverse Privacy Concerns
The Metaverse, a concept born out of science fiction and gradually becoming more commonplace, is a virtual space that blurs...
Read More
What is Penetration Testing?
In today's digital landscape, cybersecurity needs to be prioritized by businesses of all sizes, including small-to-mid-sized businesses (SMBs). As organizations...
Read More
Behind the Firewall: Understanding and Mitigating Insider Threats
In today's digital landscape, organizations face an unprecedented number of cybersecurity challenges, with one of the most insidious being insider...
Read More
Cybersecurity Concerns in an AI-driven World
In the era of rapid technological advancement, artificial intelligence (AI) is revolutionizing our lives. From self-driving cars to advanced medical...
Read More
Automated Pen Testing: The Future is Here, but Proceed with Caution
In an age where cyber threats advance at an unprecedented pace, safeguarding digital assets has never been more important. Penetration...
Read More
Picking the “Perfect” Time for Your Penetration Test
Timing is everything, and if you're anything like me, you live by your task list. Every task must have a...
Read More
Navigating the Future of Cybersecurity with NIST’s Enhanced Framework
In the ever-changing world of cybersecurity, where the only constant is change itself, staying one step ahead has never been...
Read More
Email Litigation Holds and Microsoft 365
A litigation hold, also known as a legal hold, is a preservation order that ensures relevant data is protected when...
Read More
Defending Against the Growing Ransomware Threat
It’s no secret that ransomware attacks continue to grow each year and can be devastating for small and mid-sized businesses....
Read More
Critical Web App Pen Test Considerations
Web application attacks have made the top three threats to small-to-mid-sized businesses (SMBs) two years in a row, according to...
Read More
External Penetration Testing Methodology: A Comprehensive Guide
External penetration testing is a powerful tool that can help businesses of all sizes identify and address security vulnerabilities in...
Read More
Former Uber CSO Found Guilty: A New Precedent for Security Professionals?
Maintaining a solid cybersecurity posture in today's digital world is no easy feat. It's enough to keep those in charge...
Read More
SaaS Security: Top 5 Cybersecurity Gaps in SaaS Cloud Adoption
Cloud Usage in Modern Business We have reached the point where most companies are using the cloud for some part...
Read More
Cybersecurity Risk Assessments: Compliance vs. Technical Approach
Cybersecurity Risk Assessment Definition The term cybersecurity risk assessment describes the process of identifying and analyzing an organization’s overall risk....
Read More
Web Application Penetration Testing: Basics and Methodology
The Importance of Performing a Web Application Penetration Test Web application attacks have made the top three threats to small-to-mid-sized...
Read More
What Should an Incident Response Plan Include?
https://youtu.be/PhyeW9qv54Q Interview with Eric Vanderburg - Vice President, Cybersecurity How to Write an Effective Cyber Incident Response Plan Having an...
Read More
What to Do When You’ve Been Hacked: Grab Your IRP
https://youtu.be/h95jvSEmcdw Interview with Eric Vanderburg - Vice President, Cybersecurity How to Write an Effective Cyber Incident Response Plan In today's...
Read More