by Samantha Parker | Nov 29, 2022 | Blog Posts
It’s the end of November 2022, and the numbers are in– below is a list of the most malicious cyber-attacks over the past month. As reported by Kon Briefing, cyber-attacks have affected more than 19 countries worldwide this month, with an estimated 56 breaches...
by Gillian Sweny | Nov 17, 2022 | Blog Posts
Reliance on Space Assets As the number of satellite systems orbiting in space continues to grow, so does society’s dependence on these assets for the functioning of critical systems. Specifically, satellites are integral for functioning security systems:...
by Peter Burg | Nov 9, 2022 | Blog Posts
Origin of the FTC Safeguards Rule The origins of the FTC Safeguards Rule can be traced back to the 1999 Gramm-Leach-Bliley (GLBA) act requiring financial institutions to document how they handled confidential customer data. Branching off this, in 2003, the Safeguards...
by Samantha Parker | Nov 2, 2022 | Blog Posts
It’s the end of October 2022, and the numbers are in– below is a list of the most malicious cyber-attacks over the past month. As reported by Kon Briefing, cyber-attacks have affected more than 27 countries worldwide this month, with an estimated 88 breaches reported...
by Peter Burg | Oct 24, 2022 | Blog Posts
Well, most of us could say that we saw this coming. Ransomware began wreaking havoc on businesses globally amid the COVID-19 pandemic, however, these malicious actors have their eyes set on a new form of prey – our schools. An independent study revealed that a...
by Peter Burg | Oct 21, 2022 | Blog Posts
A Brief History of XDR Coined in 2018 by Nir Zuk, Palo Alto Network’s CTO, “extended detection and response” (XDR) is a term that often incites great debate on the specifics of its definition. This debate has only led to confusion for potential clients who don’t have...