by Tony Pietrocola | Jan 11, 2023 | Blog Posts
If you are like me and are responsible for budgets or perhaps get yelled at over the budgets you approve, do you get cold sweats before you look at an invoice from AWS, Azure, or other platform providers with usage-based pricing models? To be candid, it’s the...
by Gillian Sweny | Jan 4, 2023 | Blog Posts
According to the World Economic Forum Global Risk Report, the top three risks worldwide are predictable infectious disease, income inequality, and extreme weather. Surprisingly, the fourth is cybersecurity. Directly behind some of the most known and discussed risks...
by Samantha Parker | Jan 1, 2023 | Blog Posts
It’s the end of December 2022, and the numbers are in– below is a list of the most malicious cyber-attacks over the past month. As reported by Kon Briefing, cyber-attacks have affected more than 30 countries worldwide this month, with an estimated 56...
by Peter Burg | Dec 14, 2022 | Blog Posts
Although online shopping during the holidays can be great for missing out on the crowds, long lines and saving time, it also leaves millions of people vulnerable to online shopping scams. In 2021, a baffling $337 million was stolen from American shoppers online....
by Samantha Parker | Dec 7, 2022 | Blog Posts
Cyber Criminals Have Holiday Cheer Too (But for a Different Reason) As all of us welcome this holiday season with cheer- cyber threat actors also welcome a new and cheerful opportunity to exploit your organization’s cybersecurity in the hopes of a big holiday...
by Tony Pietrocola | Dec 2, 2022 | Blog Posts
Cybercriminals are known for their relentlessness and ability to exploit hidden vulnerabilities and misconfiguration errors across a firm’s applications, endpoints, servers, and networks. Vulnerabilities can be one of the biggest threats to a firm’s network; that’s...