FEATURED BLOG

Cybersecurity Framework Assessments: Prioritizing Your Remediation

Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.

Hacking the Pipeline Ft. Brett Hodges of Cyberblack
Penetration Testing, 7X Files Guest User Penetration Testing, 7X Files Guest User

Hacking the Pipeline Ft. Brett Hodges of Cyberblack

Matt Barnett and Founder and CEO of Cyberblack, Brett Hodges, analyze the Colonial Pipeline attack in the weeks since the massive shutdown caused fuel prices to surge and incited panic buying across the country. This episode of the 7X Files digs into what we can learn from this attack and what can you do to ensure your organization isn’t the next victim.

Read More
Source Code for Windows XP, 2003, and More Leaked
Cybersecurity Awareness Guest User Cybersecurity Awareness Guest User

Source Code for Windows XP, 2003, and More Leaked

For almost 20 years, you thought it was a well-guarded secret... until now. 43GB of source code for many end-of-life Microsoft Operating Systems—including Windows and MS-DOS—have allegedly been made public through a compilation of torrent files. In this post, we'll look at the impact this may have on the current state of Window's security, what you need to know, how you may be affected, and what you can do about it.

Read More
Building Breach Resiliency Through Collaboration
Cybersecurity Awareness Guest User Cybersecurity Awareness Guest User

Building Breach Resiliency Through Collaboration

Breach resiliency is centered around building processes to aggregate and action information quickly based on what systems, technologies, etc. you have in your environment. To be effectively resilient to a breach, you must collaboratively build a thorough understanding of your environment, your workflows, your processes, and, last but certainly not least, your specific threats.

Read More