FEATURED BLOG
Securing the Supply Chain
Integrate security into every phase of the supply chain and software development to protect against evolving cyber threats in an increasingly connected world.
Money Matters TV
Matt Barnett talks with Money Matters TV about the current trends and risks for organizations in cybersecurity as well as some tips and tricks to protect yourself against scammers.
Securing the Supply Chain
Integrate security into every phase of the supply chain and software development to protect against evolving cyber threats in an increasingly connected world.
Security Framework Assessments: Interpreting Your Results
Security framework assessments provide a snapshot of your cybersecurity posture, but interpreting the results goes beyond scoring to prioritizing risks, aligning goals, and creating actionable plans to improve security.
“Help Desk, how can I help you?”
The Help Desk is a common target for social engineering attacks due to its access to sensitive information combined with staff's helpful nature and limited training on manipulation tactics.
NIST Cybersecurity Framework 2.0: Recover
Once a cyberattack is contained, the RECOVER function is about bouncing back--restoring systems, verifying backups, and coordinating with stakeholders to minimize disruption and resume normal operations.
CrowdStrike Bricks Windows
Matt Barnett talks to NBC10 Philadelphia about the Crowdstrike update.
Voice Cloning: The Rising Threat of Audio Deepfakes in Impersonation Scams
Audio deepfakes are making impersonation scams harder to detect. Learn how scammers use AI to clone voices and deceive victims in real time.
The Cost of Physical Security Testing: An In-Depth Analysis
How much 'should' it cost to engage a security firm to test your physical security controls and through what methods?
NIST Cybersecurity Framework 2.0: Respond
When a cyberattack hits, how prepared are you? The RESPOND function in NIST CSF 2.0 helps ensure timely incident management, analysis, and mitigation.
Cooking for Hashcat: Improving Old Recipes and Exploring New Ones
Recorded at Grassr00tz 2024 in Appleton, Wisconsin, Vitaliy Kovalchuk presents on improving password cracking strategies using advanced techniques and revisiting some classics. Up your password cracking game with these advanced "recipes".
NIST Cybersecurity Framework 2.0: Detect
DETECT is your early warning system. Timely detection with continuous monitoring, event analysis, and more can stop attacks before they escalate.
NIST Cybersecurity Framework 2.0: Protect
PROTECT is all about keeping your assets safe. Fortify identity management, data security, and system resilience to thwart cyber threats.
NIST Cybersecurity Framework 2.0: Identify
Keep your eyes open with asset management, risk assessment, and continuous improvement in NIST CSF 2.0 IDENTIFY.
The Team Continues to Grow
Cybersecurity firm, SEVN-X, has added Matt Wilson as Security Consultant to its team.
The Team Continues to Grow
Cybersecurity firm, SEVN-X, has added Siarhei Starasvetksi as Security Consultant to its team.
NIST Cybersecurity Framework 2.0: Govern
NIST CSF 2.0 introduces the new GOVERN function, elevating cybersecurity governance, accountability, and risk management.
NIST Cybersecurity Framework 2.0: What’s New?
CSF 2.0 is here, sharpening the edge of cybersecurity frameworks with governance, supply chain focus, and defense strategies. Learn how these updates impact you.
Introduction to the NIST Cybersecurity Framework
Learn how the NIST Cybersecurity Framework helps organizations strengthen security with flexible, adaptable practices. Explore the benefits, challenges, and tips for implementing this widely-adopted framework.
So Many Frameworks
With countless cybersecurity frameworks out there, how do you choose the right one? This series breaks down common frameworks, helping you build a stronger security foundation
The Smish-and-Grab – Latest SMS & Phishing Trends in 2024
Cybercriminals are turning to smishing—deceptive texts targeting sensitive info. Discover the growing threat and key strategies to safeguard your data from these clever attacks.