Featured Blog
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies — and How to Stop Them
It sounds like the plot of a cyber-thriller: overseas operatives posing as legitimate IT workers, passing video interviews with AI-altered faces, and logging into corporate systems from U.S.-based “laptop farms.” But this isn’t fiction. It’s a real, ongoing North Korean campaign to infiltrate American companies, earn hard currency for sanctioned programs, and potentially lay the […]
Breaches, Cyberattacks
After the Ransom was Paid: The Groundbreaking Events following the Colonial Pipeline Ransomware Attack
Supply Chain Cybersecurity, Third Party Risk Management, Vendor Risk Management
Top 3 Reasons Third-Party Vendor Risk Management is Not Easy
Cybersecurity, Cybersecurity Planning
Six Cybersecurity Best Practices That Fit Almost Any Organization’s Budget
Supply Chain Cybersecurity, Third Party Risk Management, Vendor Risk Management
The Other Side of Supply Chain Security: Tips for Organizations Being Assessed by Enterprise Clients
Cybersecurity Planning, News, Policy Development
5 Rules to Live by For Strong Cybersecurity Policy Development
Pen Testing, Web application security