FEATURED BLOG

Cybersecurity Framework Assessments: Prioritizing Your Remediation

Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.

Source Code for Windows XP, 2003, and More Leaked
Cybersecurity Awareness Guest User Cybersecurity Awareness Guest User

Source Code for Windows XP, 2003, and More Leaked

For almost 20 years, you thought it was a well-guarded secret... until now. 43GB of source code for many end-of-life Microsoft Operating Systems—including Windows and MS-DOS—have allegedly been made public through a compilation of torrent files. In this post, we'll look at the impact this may have on the current state of Window's security, what you need to know, how you may be affected, and what you can do about it.

Read More
Building Breach Resiliency Through Collaboration
Cybersecurity Awareness Guest User Cybersecurity Awareness Guest User

Building Breach Resiliency Through Collaboration

Breach resiliency is centered around building processes to aggregate and action information quickly based on what systems, technologies, etc. you have in your environment. To be effectively resilient to a breach, you must collaboratively build a thorough understanding of your environment, your workflows, your processes, and, last but certainly not least, your specific threats.

Read More