Our Blog
Check back for weekly updates
Cybersecurity Diligence Doesn’t Need to be a Heavy Lift
Corporations large and small have always used acquisitions as a staple of their strategies to enter new markets…
Deep Fakes
This paper examines the illicit ecosystem for deep fakes…
Compromise Assessments: For Remote Workforce
Many information technology and security professionals are starting to adjust to the “new normal” of administering a remote workforce…
Know Your Adversary™: Iran
While researching advanced persistent threats (APTs), the common analytic angle has always been to identify malware…
M&A Should Stand for “Mitigate, Not Avoid”
We’ve all read the horror stories over the past several years – the revelation of prior data breach in a target organization…
Cyber Hygiene for a Remote Workforce
With coronavirus gaining strength worldwide, a lot of companies are faced with something that they may have been avoiding…
Fake News Websites and a US-Macedonia Partnership
A Fake News Case Study examines the fake news industry and specific attempts from bad actors to influence opinions…
When Disinformation Targets Companies: The Case of #BoycottOliveGarden
False information can spread faster than the truth on social media, and more and more, companies are feeling the impact of that reality…
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.