Cyber Threat Research: Nuclear Power Plant Cyber Attack
In early September 2019, the Kudankulam Nuclear Power Plant in Tamil Nadu, India suffered a [...]
Cybersecurity: The Need To Find Common Ground
According to Colonial Pipeline CEO Tim Felt, paying ransom for the return of his company’s data was the hardest thing [...]
5 Reasons Technological Debt Increases the Risk of Cyber Attack
Failing to keep software and hardware up-to-date can put your business at risk for cyber [...]
2021 Mid-Year Threat Review
As the first half of 2021 comes to a close, I decided to look back [...]
Cyber Immunity in an Era of Rampant Attacks
Cyber immunity is a critical component to a successful cybersecurity strategy, especially in an era [...]
EDR Price Comparison
EDR price comparison is not the best criteria to use when selecting your Managed Service’s [...]
The Basics: Secure Software Development
Secure Software Development Lifecycle (SSDLC) is an approach to software development that emphasizes the value [...]
Check Your {User} Privileges
User privileges settings in commercial software frequently (and inadvertently) expose your business to privilege escalation attacks. Monitoring for access rights changes can help to proactively mitigate the risks. [...]
AI Driven EDR: It Doesn’t Replace Human Intervention
AI driven EDR dramatically reduced the workload involved in manual endpoint detection and response. However, [...]
ROI of PuP Detection
The security impact of detecting potentially unwanted programs is sometimes fuzzy, but in our experience, [...]
Small Business Cybersecurity Myths
Small Business Cybersecurity myths and mistakes can destroy a business. Phishing attempts, Potentially Unwanted Programs, [...]
Small Businesses Need Software Updates
Software updates and patches are frequently avoided by small and medium business owners. These [...]