Featured Blog
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies — and How to Stop Them
It sounds like the plot of a cyber-thriller: overseas operatives posing as legitimate IT workers, passing video interviews with AI-altered faces, and logging into corporate systems from U.S.-based “laptop farms.” But this isn’t fiction. It’s a real, ongoing North Korean campaign to infiltrate American companies, earn hard currency for sanctioned programs, and potentially lay the […]
Employee Cybersecurity Training, Phishing
What Should & Should NOT Be Part of Your Social Engineering Prevention Training
Digital Forensics, Microsoft Office 365
Office 365 Tools for Digital Forensics Still Scarce Since the Magic Unicorn Tool’s Untimely Demise
Compliance, NIST CSF, Privacy
The NIST Privacy Framework: Should your Organization Use It to Manage Privacy?
Microsoft Office 365, Remote Work, Vulnerabilities