Featured Blog
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies — and How to Stop Them
It sounds like the plot of a cyber-thriller: overseas operatives posing as legitimate IT workers, passing video interviews with AI-altered faces, and logging into corporate systems from U.S.-based “laptop farms.” But this isn’t fiction. It’s a real, ongoing North Korean campaign to infiltrate American companies, earn hard currency for sanctioned programs, and potentially lay the […]
Cybersecurity Planning, Risk Assessments, Supply Chain Cybersecurity, Vendor Risk Management, Vulnerabilities
The 4 Top Cybersecurity Threats of 2022
Cybersecurity, News, Patch Management, Supply Chain Cybersecurity
6 Software Patch Management Policy Mistakes (and How to Fix Them)
Breaches, Ransomware
Inside the DOJ Crackdown on DarkSide & REvil / Sodinokibi Ransomware Crime Groups
Cybersecurity Planning