FEATURED BLOG
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.
Prospect Health (affecting Crozer Health) Ransomware attack
Matt Barnett talks to NBC10 Philadelphia about the Prospect Health security breach.
Ransomware attack locks up the camden county police department
Matt Barnett talks to NBC10 Philadelphia about the recent ransomware attack on the Camden County Metro PD and Prosecutors Office.
Boost Mobile Security Breach
Matt Barnett talks to NBC10 Philadelphia about the Boost Mobile security breach.
Building Breach Resiliency Through Collaboration
Breach resiliency is centered around building processes to aggregate and action information quickly based on what systems, technologies, etc. you have in your environment. To be effectively resilient to a breach, you must collaboratively build a thorough understanding of your environment, your workflows, your processes, and, last but certainly not least, your specific threats.
Stay Steps Ahead With Assumed Breach Testing
The word 'assume' tends to have a bad reputation. After all, we’re taught from a young age what happens when you 'assume'; however, when it comes to security testing, the ‘Assumed Breach’ approach can be a great way to help your organization gain insight that further improves your defenses.