Our Experience at the Biggest Cybersecurity Week of 2017

The last week of July is special for those enthusiastic about information security as it hosts the biggest events in information security technology, solutions, services, cyber ...
Read More

The Realities of Patch Management Best Practices

The rise of malware and specifically ransomware attacks are reminding businesses around the world that patching vulnerabilities remains a necessity. However, the culture of ...
Read More

Zero-Day Found in Windows NTLM Security Protocol

Microsoft released an update pack this Tuesday, July 11 to correct a serious privilege escalation breach that affects all Windows versions launched after 2007. The breach ...
Read More

Return on Security Investment: Data Breach Example [Part 2]

In a previous blog post, we showed how Beckstrom’s Law could be applied to measuring a Return On Security Investment (ROSI). Here's a quick recap:
Read More

5 High-Value Cyber Security Solutions

Security consulting firms can offer a wealth of knowledge in protecting your business from the latest cybersecurity threats and vulnerabilities. The best security firms provide ...
Read More

Return on Security Investment: The Simple Formula [Part 1]

One can say that the real purpose of Information Security is to preserve value: the value of intellectual property, transactions, access to and dissemination of information, ...
Read More

Protecting Yourself from Petwrap or NotPetya or Petya

Watching news stories this morning on national media, it seems that the public feels somewhat helpless in how to defend themselves from the latest ransomware onslaught, ...
Read More

CIPHER ALERT - New Global Threat Petya or Petwrap

News of a new global ransomware attack began to emerge this morning (6-27-2017). Companies in Ukraine, Spain, the Netherlands, Denmark and the United Kingdom have already been ...
Read More