SEVN-X Blog
A Blog for Nerds
Featured Post
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Jan 22, 2025 11:57:33 AMCybersecurity Frameworks Series, part 11 After a cybersecurity framework assessment performed by a third-party cybersecu...
Ransomware Hits Delaware Public Libraries
Jan 22, 2025 11:57:19 AMMatt Barnett sits down with NBC10 to talk about the ransomware attack on the Delaware public library system. The Video
Money Matters TV
Jan 22, 2025 11:56:31 AMMatt Barnett sits down with Doug Hepburn’s Money Matters TV to talk about the current trends and risks for organizations...
Securing the Supply Chain
Jan 22, 2025 11:56:18 AMHow Far Can We Integrate Security into Software Development Author: Steve Foret “We calculated a supply chain interconne...
NIST Cybersecurity Framework 2.0: Interpreting Your Results
Jan 22, 2025 11:56:11 AMAuthors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 10 Should your organization use a recognized c...
“Help Desk, how can I help you?”
Jan 22, 2025 11:56:02 AMWhy the Help Desk is a Prime Target for Social Engineering Attacks AuthorS: Ross JAFFE | Steve Foret Overview The Help D...
NIST Cybersecurity Framework 2.0: Recover
Jan 21, 2025 4:23:23 PMAuthors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 9 Today, we will take a deep dive into the REC...
Crowdstrike Bricks Windows
Jan 21, 2025 4:08:47 PMMatt Barnett sits down with NBC10 to talk about how an update from CrowdStrike on Friday, July 19 brought down millions ...
Voice Cloning: The Rising Threat of Audio Deepfakes in Impersonation Scams
Jan 21, 2025 4:07:58 PMAuthor: Stephen Bondurich Introduction By now, most of us know how to handle a suspicious phone call from a stranger. We...
NIST Cybersecurity Framework 2.0: Respond
Jan 21, 2025 3:47:05 PMAuthors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 8 Today, we will take a deep dive into the RES...