Humans: The Greatest Asset in Cybersecurity
The myth that humans are the weakest link in cybersecurity has persisted for too long. While it’s true that human errors can lead to vulnerabilities, and do indeed cause...
2 min read
The myth that humans are the weakest link in cybersecurity has persisted for too long. While it’s true that human errors can lead to vulnerabilities, and do indeed cause...
2 min read
Imagine your organization's cyber defenses as a well-trained emergency response team. (Work with us here). Just like a strong immune system in a...
3 min read
The annual release of Microsoft’s Digital Defense Report is always a milestone moment for the cybersecurity industry. For us, as an organization...
4 min read
When INTERPOL recently announced they would stop using the term “pig butchering” in favor of “romance baiting,” it reminds me that we're overdue for...
4 min read
If you’ve been involved in a phishing scenario where the attack was successful, it’s pretty hard to gain a sense of trust when plugging in a device...
2 min read
Discover what the TAKE IT DOWN Act is, why it matters for combating AI deepfakes and non-consensual imagery, and what’s next in the fight to enhance...
4 min read
Whenever you’re surfing the internet, every click, search, and scroll leaves behind a small trace known as a digital footprint. While it might seem...
2 min read
“The only rules that really matter are these: what a man can do and what a man can’t do. Savvy?” - Captain Jack Sparrow
3 min read
Imagine your personal login details being swiped from one site, then used to break into your accounts elsewhere. Sounds intrusive, right?
2 min read
BEC, or Business Email Compromise, affects companies of all sizes. After gaining access to or knowledge of a trusted colleague or business partner's...
2 min read