Skip to the main content.

Bloggin’!

Turn and face the strange. We have all sorts of helpful posts here to get you leveled up ASAP. From cutting edge changes to best practices, we've got you covered.
a puzzle is nearly complete, the final puzzle piece is about to be slotted in

Revealing Missing Security Metrics

The more we dug into it, the more we realized there was a lack of emphasis on relevant security awareness metrics. This absence forms a crucial disconnect between recognized...

2 min read

a salmon swims up river over a small waterfall

Cracking the Phishing Filter Conflict

Automated phishing tools certainly make personal email safer by catching spam and phishing attempts more quickly. But the truth is that no system is...

2 min read

Hand holding a compass in front of a mountainous background

The Current Landscape of Cyber Risk Management

In the quickly evolving world of cyber risk management, many organizations find themselves tethered to outdated methods. Often constrained by budget...

3 min read

Combating the Popularity of Gift Card Phishing Attacks

Gift card phishing, though not a new tactic, continues to pose significant threats in the realm of cybersecurity. In this ongoing campaign,...

2 min read

A Cascade of Avoidable Errors: The Microsoft Breach & Human Risk in Modern Security Practice

Key Considerations for CISO’s in the wake of the CRSB’s Report on the MSFT Breach As we all know, the need for cybersecurity is still on the rise,...

7 min read

Coffee cup with an alert symbol floating on top

Is Nothing Sacred? Nespresso Hacked

Brewing Trouble: Nespresso Domain Hijacked in Phishing Attack Targeting Microsoft Logins In the caffeinated world of cybersecurity, a bitter brew is...

1 min read

a conductor leads an orchestra

Conducting an Orchestra with Awareness Training

Imagine your organization as a symphony orchestra, with each employee playing a crucial role in creating a harmonious melody of cybersecurity. Just...

2 min read

castle with a flag saying policies

Policies: The Ultimate Cybersecurity Fortress

In the intricate labyrinth of cybersecurity, where threats lurk in the shadows of every digital transaction, policies emerge as the guiding beacons,...

4 min read

a blackbelt in karate stands in a defensive stance in front of his computer where his email is showing

Safeguarding Against Business Email Compromise (BEC) Threats

BEC Attacks on the Rise: Unveiling the Landscape The digital realm is witnessing a surge in BEC attacks, with threat actors perfecting the art of...

2 min read