Apr 1, 20234 min readTop 10 Considerations for Cybersecurity Program Development for Small and Medium BusinessSmall and medium-sized businesses (SMBs) are increasingly becoming targets of cyber-attacks due to their perceived vulnerabilities as...
Mar 27, 20234 min readIntroduction to 802.11wIn today's modern world, wireless networking has become an integral part of our daily lives. From personal use to business, we rely on...
Dec 24, 20222 min readWhat is the Microsoft AD noPac Exploit?The noPac Microsoft Active Directory exploit is a security vulnerability that was discovered in 2021 and affects Microsoft Active Directory
Oct 6, 20222 min readWhat is Log4J and how should you protect your business?On December 9, a major vulnerability was discovered in a popular open source software package that by the next day companies were scrambling
Oct 6, 20223 min readCybersecurity Due Diligence in M&A transactions.Cybersecurity due diligence is an important step in M&A transactions. Security gaps may lead to loss of intellectual property, customer...
Oct 5, 20221 min readMarket Growth for MDR services is estimated to be $1.67B by 2026According to Cision, the Managed Detection and Response (MDR) services market share is estimated to grow by USD 1.67 billion.
Oct 5, 20223 min readBehavioral Economics and Risk Management in Cybersecurity.In 1979, Daniel Kahneman and Amos Tversky won the Noble Prize for their work studying how people make decisions that involve risk and...
Dec 17, 20202 min readProtecting your business during COVID.COVID-19 is the catalyst to one of the largest mass migrations to a digital workforce in history. But these changes come at a price...
Nov 5, 20203 min readKey Findings from the 2020 Ponemon Institute Cost of a Data Breach StudyThe Ponemon Institute has recently completed the global 2020 Cost of a Data Breach report and it's time for me to recap some of the top...