Ben Card Jun 142 minEternity Project: A Potent ThreatToolset Is a Potent Threat. A dangerous new malware subscription service capable of a wide variety of attacks has been identified.
Ben Card Jun 93 minNew SEC Cyber Rules ProposedCompanies will be required to disclose significant information regarding cybersecurity incidents as well as security preparedness.
Ben Card May 162 minUkraine Conflict: Spilling Over Into Civilian NetworksCyber attacks are increasing, not only to harm Western powers, but "innocent bystanders” - organizations that are not directly involved
Greg JohnsonJan 74 min3 CYBER PREDICTIONS - 2022 What better way to predict the future than by asking the real wizards? What follows is a compendium of our collective thoughts.
Ben Card Aug 25, 20212 minFinTech Companies: An Investment in Security is CriticalFinTech—new technology that is designed to improve and automate the use of financial systems. The term was coined in the 21st Century...
Ben Card Jul 27, 20212 minNew NIST Security Guidelines Raise the BarThe EO on Improving the Nation’s Cybersecurity will raise the bar for information security across the board.
Ben Card Jun 2, 20212 minJBS Cyber Attack - How Much Critical Infrastructure is Vulnerable?How can we prevent what happened to JBS happening at your company? Yet another major player in the Western World’s supply chain has seen...
Ben Card Jun 1, 20212 minIs CISA Empowerment the Key to America’s Cyber Success?...the situation is more hopeful now that the country is at least heading in the right direction.
Ravi DasNov 5, 20205 minMSPs: Are You Missing The Wave? We find that many MSPs are “missing the wave” by leaving revenue on the table and not catching the cybersecurity surf...
Greg JohnsonOct 5, 20203 min3 Minute Book Review: Testing and Securing Web Applications This is a book touching not just on the web application itself, but the whole cloud infrastructure that supports it.
Ravi DasSep 21, 20205 minThe Importance of The FISO Today"One of the key benefits of a FISO is that they are hired on a contractual basis, they are highly scalable, unlike the direct-hire CISO."