
February 18, 2022
This post offers a number of basic security recommendations for medical devices.
Blog

February 10, 2022
This advisory offers recommendations for organizations potentially affected by Russian state-sponsored activity in Ukraine.
Blog

January 28, 2022
When organizations build trust and respect the right to privacy, people are ultimately more likely to continue a business relationship.
Blog

January 26, 2022
We identified Ivy framework fileless attack techniques that execute undetected in Microsoft Office. Here's how with suggested security augmentations.
Blog

January 18, 2022
Third-party risk management (TPRM) requires a team approach. Also, don’t reinvent the wheel; an established, proven lifecycle can be very successful.
Blog

January 11, 2022
We identified Ivy framework fileless attack techniques that execute undetected in Microsoft Office. Here's how with suggested security augmentations.
Blog

January 10, 2022
In this series, we explain the threats, issues and impacts associated with managing third-party organizations and discuss how best to minimize risk.
Blog

December 06, 2021
In this series, we explain the threats, issues and impacts associated with managing third-party organizations and discuss how best to minimize risk.
Blog

December 01, 2021
Breaches are increasing rapidly. Complete visibility into your data sources helps discover and remediate incidences of abnormal data exfiltration.
Blog

December 01, 2021
Once-effective OT defense techniques like air-gapping are largely ineffective. Attack vectoring can shut down attack paths before they’re exploited.
Blog

November 19, 2021
This post discusses the creation of Azure test virtual machines and assigning an allowed IP address as part of a Power Automate cloud flow.
Blog

November 09, 2021
A range of private-sector companies conduct cost-effective NIST CSF-based cloud risk assessments following the tenets of existing NIST publications.
Blog