We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

Protecting Backup and Recovery in the Age of Ransomware
Ransomware attackers frequently target backups and recovery systems to force victims into paying ransoms, making robust protection strategies essential for all…

Maturing a Business Continuity Program: From Reactive to Resilient
During our next webinar, learn how to thrive through disruption and successfully align your Business Continuity Program (BCP) with the business' goals and risk…

Penetration Testing and Burnout
It's that feeling of your nerves being stretched like sinew over mounting expectations and due dates. When your attention keeps an exhausted but stubborn focus…

Defensive Backup Infrastructure Controls Framework
Use the Defensive Backup Infrastructure Controls framework to take a hard look at your organization's backup and recovery capabilities.

CMMC Level and Assessment Requirements for Defense Contractors
Many DoD contractors are struggling to understand what requirements will apply to them once CMMC rolls out. CMMC defines three levels, but CMMC Level 2 may…

Ask Me Anything – PCI DSS
Ask our experts anything about Payment Card Industry Data Security Standard (PCI DSS) during this live session! Our compliance team will help you understand…

Dealing With Unmarked and Mismarked CUI
Implementing CMMC and other Controlled Unclassified Information (CUI) protection obligations depends on the accurate identification of CUI, and in some cases…

The Proliferation of “Fake” CMMC Contract Clauses
Defense subcontractors may already be seeing CMMC clauses in their contracts, even though the CMMC contracting procedures and contract clause have yet to be…

PivotTables For InfoSec Dummies
Plenty of people know how to toss an IP address and port list into Excel for sorting and searching but don’t get a chance to take it to a deeper level. Excel…

Black Hat USA Training - Adversary Tactics and Threat Hunting
During our Black Hat training, you will learn hands-on attacks that directly correlate to industry relevant TTPs, while performing threat hunting exercises and…

Let's Clone a Cloner - Part 3: Putting It All Together
We have arrived at our final stage of metamorphosis, taking our pupa and morphing it into a hacking machine. Let's finish this journey. Geared Up Pupa In the…

Measuring Effectiveness for Business Resilience
Testing and assessing security effectiveness is a core component of business resilience. Learn why this type of testing can help ensure you're protecting your…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
