by Samantha Parker | Apr 12, 2022 | Blog Posts
Staying in the Know Today, determining the effectiveness of an organization’s cybersecurity operations is challenging to say the least, especially with the rate at which new threats emerge each year. It demands that organizations stay up to date on emerging threats...
by Arielle Miller | Apr 5, 2022 | Blog Posts
What is IoT? The Internet of Things (IoT) describes the network of physical objects – “things” – that are embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems over the internet, without real-time human...
by Gillian Sweny | Mar 30, 2022 | Blog Posts
On March 15, President Joe Biden signed into law the Cyber Incident Reporting for Critical Infrastructure Act. This Act mandates that private sector entities must inform the Cybersecurity and Infrastructure Security Agency (CISA) after suffering a data breach or make...
by Gillian Sweny | Mar 22, 2022 | Blog Posts
Early on March 22, Single-Sign-On provider Okta, an organization that allows people to use one account to log into multiple digital services, confirmed they are investigating a potential breach by Lapsus$, a hacking group. Knowledge of the possible breach came out...
by Samantha Parker | Mar 17, 2022 | Blog Posts
At its core, eXtended Detection and Response (XDR) is a holistic approach to threat detection, as it automatically detects and responds to multiple security layers all in one platform. Considering today’s ever-growing rate of new, complex security threats, it is vital...
by Gillian Sweny | Mar 15, 2022 | Blog Posts
The FBI’s office of Private Sector, Counterintelligence Division, and Training Division recently released the below 30-minute film titled: Made in Beijing: The Plan for Global Market Domination. The video sounds the alarm, helping private sector partners recognize the...