Featured Blog
Where Strategy Meets Reality: Hybrid Cloud Security in an Era of Escalating Cyber Risk
To understand modern hybrid cloud security, let’s take a moment to unpack how today’s hybrid cloud architecture evolved before we dive into the best way to defend it against today’s risks. Not too long ago, “cloud-native” became the banner under which public cloud providers sold a vision of modern IT. The pitch was compelling and […]
Pen Testing, Security contols, Security Controls Reports
Top Cybersecurity Control for Q4 2023: Penetration Testing
Incident Response, Zero day exploits
Double Trouble: Understanding Two Cisco Zero Day Vulnerabilities & Guide to Zero Day Attack Response
Business email compromise, Social Engineering
Social Engineering Scams: Cross-Tenant Impersonation Attacks, Voice Cloning Risks, and More
Microsoft Office 365
M365 Security: Leveraging CIS Standards for Optimal Security and Advanced Threat Mitigation
News, Social Engineering
2023 MGM Breach: A Wake-Up Call for Better Social Engineering Training for Employees
Compliance, Cybersecurity Planning, NIST CSF