by Gillian Sweny | Mar 22, 2022 | Blog Posts
Early on March 22, Single-Sign-On provider Okta, an organization that allows people to use one account to log into multiple digital services, confirmed they are investigating a potential breach by Lapsus$, a hacking group. Knowledge of the possible breach came out...
by Samantha Parker | Mar 17, 2022 | Blog Posts
At its core, eXtended Detection and Response (XDR) is a holistic approach to threat detection, as it automatically detects and responds to multiple security layers all in one platform. Considering today’s ever-growing rate of new, complex security threats, it is vital...
by Gillian Sweny | Mar 15, 2022 | Blog Posts
The FBI’s office of Private Sector, Counterintelligence Division, and Training Division recently released the below 30-minute film titled: Made in Beijing: The Plan for Global Market Domination. The video sounds the alarm, helping private sector partners recognize the...
by Tony Pietrocola | Mar 2, 2022 | Blog Posts
The recent rise in cyber threats comes as a result of the increase in cloud adoption across the globe, intending to increase business agility and resilience. However, that doesn’t mean electing to use cloud-based-hosted environments will make an organization more...
by Gillian Sweny | Feb 24, 2022 | Blog Posts
Summary: It is known from at least January 2020, through February 2022, the Federal Bureau of Investigation (FBI), National Security Agency (NSA), and Cybersecurity and Infrastructure Security Agency (CISA) have observed regular targeting of U.S. cleared defense...
by Gillian Sweny | Feb 7, 2022 | Blog Posts
It’s not uncommon for organizations to fear moving to the cloud – yet, moving to the cloud is an increasingly popular choice nowadays. Although CIO’s and CTO’s view on-premises hosting to be much more secure, more organizations in the small to mid-size business realm...