Mobile device cybersecurity considerations August 8, 2024Grant Burns Don’t let mobile and IoT cybersecurity considerations go unaddressed…Learn MoreMobile device cybersecurity considerations
Government Contractors: Conquer CMMC with an Enclave Approach June 13, 2024Grant Burns Navigate CMMC with Efficiency…Learn MoreGovernment Contractors: Conquer CMMC with an Enclave Approach
Patch It Fast, Patch It Right: Lessons Learned from the 2024 Verizon Data Breach Investigations Report May 17, 2024Grant Burns The 2024 Verizon DBIR offers great wisdom for cyber defenders…Learn MorePatch It Fast, Patch It Right: Lessons Learned from the 2024 Verizon Data Breach Investigations Report
DoD Delays Adoption of New NIST Cybersecurity Standards for Contractors May 8, 2024Grant Burns NIST SP 800-171 Rev. 2 or Rev. 3?…Learn MoreDoD Delays Adoption of New NIST Cybersecurity Standards for Contractors
Patch Now! Critical Vulnerability in XZ Utils (CVE-2024-3094) April 1, 2024April 1, 2024Grant Burns Linux users beware! A critical vulnerability in XZ Utils (CVE-2024-3094) allows attackers remote access. Check your version and patch immediately!…Learn MorePatch Now! Critical Vulnerability in XZ Utils (CVE-2024-3094)
How to address legacy systems March 20, 2024March 20, 2024Grant Burns Encountering an unpatchable application vulnerability due to limited vendor support can be a challenge, but there are several options you can explore to address the system.…Learn MoreHow to address legacy systems
CMMC 2.0 Proposed Rule December 28, 2023Grant Burns The CMMC 2.0 Proposed Rule…Learn MoreCMMC 2.0 Proposed Rule
Protect Your Business from Known Exploited Vulnerabilities November 8, 2023November 8, 2023Grant Burns Reviewing the importance of prioritizing remediation of known exploited vulnerabilities.…Learn MoreProtect Your Business from Known Exploited Vulnerabilities
Reporting fraudulent email September 29, 2023September 29, 2023Grant Burns Email impersonation: the importance of reporting…Learn MoreReporting fraudulent email
Business Email Compromise (BEC) Attacks July 12, 2023July 12, 2023Grant Burns How to Prevent and Respond to Business Email Compromise Attacks…Learn MoreBusiness Email Compromise (BEC) Attacks