Skip to the main content.

Bloggin’!

Turn and face the strange. We have all sorts of helpful posts here to get you leveled up ASAP. From cutting edge changes to best practices, we've got you covered.
a business man casts the shadow of a superhero

Cyber Smarties: Supercharge Your Team with Security Awareness Training

Did you know that a jaw-dropping 3.4 billion phishing emails are sent daily? That's why having a top-notch cyber and security threat awareness...

2 min read

a microphone in front of a crowded and attentive audience

Unlocking Change: Engaging Ways to Boost Security Awareness

While firewalls, passwords, and antivirus software stand as stalwart defenders, there's one crucial element often overlooked in the defense arsenal:...

3 min read

a laptop sits on a pedestal with a mystical background

Cyber Secrets Unleashed: Developer Wisdom from Digital Guardians

Cybersecurity Laws These are the rules and regulations governing digital space. They determine what is considered lawful or unlawful in cyberspace....

3 min read

a puzzle is nearly complete, the final puzzle piece is about to be slotted in

Revealing Missing Security Metrics

The more we dug into it, the more we realized there was a lack of emphasis on relevant security awareness metrics. This absence forms a crucial...

2 min read

a salmon swims up river over a small waterfall

Cracking the Phishing Filter Conflict

Automated phishing tools certainly make personal email safer by catching spam and phishing attempts more quickly. But the truth is that no system is...

2 min read

Hand holding a compass in front of a mountainous background

The Current Landscape of Cyber Risk Management

In the quickly evolving world of cyber risk management, many organizations find themselves tethered to outdated methods. Often constrained by budget...

3 min read

Combating the Popularity of Gift Card Phishing Attacks

Gift card phishing, though not a new tactic, continues to pose significant threats in the realm of cybersecurity. In this ongoing campaign,...

2 min read

A Cascade of Avoidable Errors: The Microsoft Breach & Human Risk in Modern Security Practice

Key Considerations for CISO’s in the wake of the CRSB’s Report on the MSFT Breach As we all know, the need for cybersecurity is still on the rise,...

7 min read

Coffee cup with an alert symbol floating on top

Is Nothing Sacred? Nespresso Hacked

Brewing Trouble: Nespresso Domain Hijacked in Phishing Attack Targeting Microsoft Logins In the caffeinated world of cybersecurity, a bitter brew is...

1 min read