Bloggin’!
Culture

The New Frontier of Phishing: AI-Generated Scams Targeting Executives
Cybercriminals are leveraging artificial intelligence to launch phishing attacks that are more sophisticated, convincing, and dangerous than ever...
3 min read

Trend Report: AI-Driven Phishing and Deepfake Threats
AI isn’t just powering innovation—it’s powering threats. From deepfake scams to AI-generated phishing attacks, cybercriminals are using these...
2 min read

Predictions for 2025: What Matters for Your Human Risk Strategy
We love predictions. They’re equal parts art and science, a kaleidoscope of insight, pattern recognition, and a touch of bold speculation. As we dive...
3 min read

Incident Response:How to Help Employees When Cyber Threats Strike
Imagine your organization's cyber defenses as a well-trained emergency response team. (Work with us here). Just like a strong immune system in a...
3 min read

Cybersecurity Culture Transformation: Microsoft’s Digital Defense Report
The annual release of Microsoft’s Digital Defense Report is always a milestone moment for the cybersecurity industry. For us, as an organization...
4 min read

Enhanced Phishing Training: Dealing with Today's Threats
If you’ve been involved in a phishing scenario where the attack was successful, it’s pretty hard to gain a sense of trust when plugging in a device...
2 min read

The EU AI Act Breakdown: What it Means for Cybersecurity
The EU AI Act has officially passed!
2 min read

Cyber Security Awareness Month: Why It Matters and How You Can Participate
Cybersecurity Awareness Month—love it or hate it, there's no denying it's like the Marmite of corporate initiatives. Every October, organizations...
5 min read

9 Ideas for Cyber Security Awareness Month
If you own, run, or work at any sized company–with the threat landscape today, you should be thinking about the company's cyber security strategy....
5 min read