FEATURED BLOG
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.
Ransomware Hits Delaware Public Libraries
Matt Barnett sits down with NBC10 to talk about the ransomware attack on the Delaware public library system.
Money Matters TV
Matt Barnett talks with Money Matters TV about the current trends and risks for organizations in cybersecurity as well as some tips and tricks to protect yourself against scammers.
Securing the Supply Chain
Integrate security into every phase of the supply chain and software development to protect against evolving cyber threats in an increasingly connected world.
Cybersecurity Framework Assessments: Interpreting Your Results
Cybersecurity framework assessments provide a snapshot of your cybersecurity posture, but interpreting the results goes beyond scoring to prioritizing risks, aligning goals, and creating actionable plans to improve security.
“Help Desk, how can I help you?”
The Help Desk is a common target for social engineering attacks due to its access to sensitive information combined with staff's helpful nature and limited training on manipulation tactics.
NIST Cybersecurity Framework 2.0: Recover
Once a cyberattack is contained, the RECOVER function is about bouncing back--restoring systems, verifying backups, and coordinating with stakeholders to minimize disruption and resume normal operations.
CrowdStrike Bricks Windows
Matt Barnett talks to NBC10 Philadelphia about the Crowdstrike update.
Voice Cloning: The Rising Threat of Audio Deepfakes in Impersonation Scams
Audio deepfakes are making impersonation scams harder to detect. Learn how scammers use AI to clone voices and deceive victims in real time.
The Cost of Physical Security Testing: An In-Depth Analysis
How much 'should' it cost to engage a security firm to test your physical security controls and through what methods?
NIST Cybersecurity Framework 2.0: Respond
When a cyberattack hits, how prepared are you? The RESPOND function in NIST CSF 2.0 helps ensure timely incident management, analysis, and mitigation.
Cooking for Hashcat: Improving Old Recipes and Exploring New Ones
Recorded at Grassr00tz 2024 in Appleton, Wisconsin, Vitaliy Kovalchuk presents on improving password cracking strategies using advanced techniques and revisiting some classics. Up your password cracking game with these advanced "recipes".
NIST Cybersecurity Framework 2.0: Detect
DETECT is your early warning system. Timely detection with continuous monitoring, event analysis, and more can stop attacks before they escalate.
NIST Cybersecurity Framework 2.0: Protect
PROTECT is all about keeping your assets safe. Fortify identity management, data security, and system resilience to thwart cyber threats.
NIST Cybersecurity Framework 2.0: Identify
Keep your eyes open with asset management, risk assessment, and continuous improvement in NIST CSF 2.0 IDENTIFY.
The Team Continues to Grow
Cybersecurity firm, SEVN-X, has added Matt Wilson as Security Consultant to its team.
The Team Continues to Grow
Cybersecurity firm, SEVN-X, has added Siarhei Starasvetksi as Security Consultant to its team.
NIST Cybersecurity Framework 2.0: Govern
NIST CSF 2.0 introduces the new GOVERN function, elevating cybersecurity governance, accountability, and risk management.
NIST Cybersecurity Framework 2.0: What’s New?
CSF 2.0 is here, sharpening the edge of cybersecurity frameworks with governance, supply chain focus, and defense strategies. Learn how these updates impact you.
Introduction to the NIST Cybersecurity Framework
Learn how the NIST Cybersecurity Framework helps organizations strengthen security with flexible, adaptable practices. Explore the benefits, challenges, and tips for implementing this widely-adopted framework.