Featured Blog
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies — and How to Stop Them
It sounds like the plot of a cyber-thriller: overseas operatives posing as legitimate IT workers, passing video interviews with AI-altered faces, and logging into corporate systems from U.S.-based “laptop farms.” But this isn’t fiction. It’s a real, ongoing North Korean campaign to infiltrate American companies, earn hard currency for sanctioned programs, and potentially lay the […]
Health care
The Unique Challenges of Healthcare Cybersecurity & How to Reduce Your Organization’s Risks
Cybersecurity, Cybersecurity Planning, Employee Cybersecurity Training
Our Top 3 Cybersecurity Awareness Month Tips That Won’t Break the Bank
Breaches, Cloud
Unprecedented Microsoft Azure Cloud Vulnerability Highlights Need for Improved Cloud Security Controls
Cyberattacks, Cybersecurity, Data Breaches
How to Prevent Cyber Attacks – Including Escalating Nation State-Sponsored Attacks
Government
Five Key Upcoming Changes in Cyber Compliance Legislation and Incident Reporting Procedures for Federal Contractors
Data encryption, Incident Response