Introduction Since the outbreak of the Covid-19 pandemic, employees have become all too familiar with the Work From Anywhere (WFA) and Work From Home (WFH)
Category: Cybersecurity
Introduction Supply Chain Risk is a major issue for businesses and consumers (think Colonial Pipeline or JB Meat Packing). Security incidents have been reported for
Introduction Since its inception, Amazon Sidewalk has been drawing quite a bit of controversy. Cybersecurity professionals are concerned about the security and lack of visibility
Introduction Vulnerability management is a very effective tool to mitigate the risk of a cyber-attack. Security vulnerabilities such as misconfigurations and missing patches can open
Introduction Penetration testing is an attempt to test the security of a given organization by using the same tactics, techniques, and tools that hackers use.
We like to think we can trust our co-workers to do the right thing. Unfortunately, this is not always the case. Some people become insider
Introduction In the world of digital warfare, phishing attacks are one of the most dangerous and prevalent cybercrimes organizations are facing today. Fraudsters are using
Introduction Cyber-criminals use back-to-school scams by impersonating trusted educational institutions in their phishing attacks. These hackers aim at stealing either student’s intellectual property or financial
With the recent move for many to working from home, there are a lot of questions around virtual conferencing platforms. Much of the attention has
Risks & rewards of social media Social media is a great tool in your organization’s communications toolbox. Many Americans have accounts on at least one