Our Blog
Check back for weekly updates
Insider Threat: Reducing Gaps and Increasing Visibility for a Remote Workforce
While the rapid shift from office to home or remote-based activity has allowed work to continue…
Cybersecurity Diligence is Financial Diligence
Healthy deal flow that enables investment at a price point in line with an exit strategy is the foundation…
Insider Threat Indicators to Help Baseline an Insider Threat Program
Insider Threats aren’t just individual malicious employees. They may be anyone who had or has…
Cybersecurity Diligence Doesn’t Need to be a Heavy Lift
Corporations large and small have always used acquisitions as a staple of their strategies to enter new markets…
Deep Fakes
This paper examines the illicit ecosystem for deep fakes…
Compromise Assessments: For Remote Workforce
Many information technology and security professionals are starting to adjust to the “new normal” of administering a remote workforce…
Know Your Adversary™: Iran
While researching advanced persistent threats (APTs), the common analytic angle has always been to identify malware…
M&A Should Stand for “Mitigate, Not Avoid”
We’ve all read the horror stories over the past several years – the revelation of prior data breach in a target organization…
Cyber Hygiene for a Remote Workforce
With coronavirus gaining strength worldwide, a lot of companies are faced with something that they may have been avoiding…
Fake News Websites and a US-Macedonia Partnership
A Fake News Case Study examines the fake news industry and specific attempts from bad actors to influence opinions…
When Disinformation Targets Companies: The Case of #BoycottOliveGarden
False information can spread faster than the truth on social media, and more and more, companies are feeling the impact of that reality…
Stay up to the minute
Subscribe to our blog to get notified of updates in your inbox.