Category Archives: Security

12 CRITICAL SECURITY CONTROLS: Patch & Vulnerability Management

Patch and vulnerability management are essential pillars of proactive cybersecurity. They enable organizations to pinpoint[...]

12 CRITICAL SECURITY CONTROLS: Endpoint Detection & Response (EDR)

By implementing a best-in-class Endpoint Detection and Response (EDR) solution, you can significantly reduce your[...]

12 CRITICAL SECURITY CONTROLS: Security Awareness Training & Simulated Phishing

By embracing these best practices, you can turn your biggest cyber liability (your employees) into[...]

12 CRITICAL SECURITY CONTROLS: Email Filtering & Web Security

Follow these email filtering and web security best practices to safeguard your organization’s digital assets[...]

12 CRITICAL SECURITY CONTROLS: Password Multi-Factor Authentication

Multi-factor Authentication is one of the most effective and affordable security controls available to safeguard[...]

Remote Code Execution Vulnerability Affecting FortiOS and FortiProxy (CVE-2023-33308)

On July 11th, 2023, Fortinet published a security advisory detailing a remote code execution vulnerability affecting FortiOS[...]

Recommendations for Mitigating Cyber Risks During Russia/Ukraine Conflict

The White House has warned about the potential for Russia to engage in malicious cyber[...]

Webinar: Cyber Insurance. And The War On Ransomware.

Cyber insurance is a must-have weapon for all organizations trying to mitigate modern security threats.[...]

Cybersecurity Lingo Every C-Level Executive Should Know

Businesses face various security threats, including ransomware, phishing attacks, computer viruses, and more. With these[...]

Enhancing Security from the Cloud to the Edge

As IT infrastructure keeps expanding, first to the Cloud and now to the Edge, businesses[...]