Blog

Header_strip
blog-bg-shape

Posts about:

Resources

2023 Threat Intelligence Report Released
K logix just released the 2023 Annual Threat Intelligence Report. Down...
Read More
Navigating Google and Yahoo Email Authentication Requirements in 2024
Big changes loom on the horizon for the world of email. Gmail and Yaho...
Read More
2024 Artificial Intelligence Trends
2024 will be an even bigger year for Artificial Intelligence (AI), wit...
Read More
Top 5 Cyber Trends of 2024
1. Generative AI will make an impact CISOs and security leaders who pe...
Read More
Breakdown of the MOVEit Transfer Breach and MITRE ATT&CK Mapping
What Happened? MOVEit Transfer is Progress Software’s managed file tra...
Read More
How the SEC Views Materiality
The Securities and Exchange Commission (SEC) has adopted a new rule th...
Read More
Updated SEC Rules on Cybersecurity
On July 26th, the Securities and Exchange Commission adopted their muc...
Read More
The Fundamentals of API Security
Introduction: Application Programming Interfaces (APIs) are pivotal dr...
Read More
The Positive Side of AI
OVERVIEW OF ARTIFICIAL INTELLIGENCE In this day and age, Artificial In...
Read More
The CISO’s Guide to Artificial Intelligence
ChatGPT has made Artificial Intelligence (AI) a widespread topic of co...
Read More
ChatGPT in the Workplace
Why to limit employee use, and what it means to your business ChatGPT,...
Read More
New MOVEit Transfer Vulnerability
A few days ago, a new vulnerability was discovered in the file transfe...
Read More
The Importance of Cybersecurity Awareness and Training Programs
In today's digital age, cybersecurity has become a critical concern fo...
Read More
Coming to the Table(top) for Incident Response
It's no secret that organizations are heavily reliant on technology to...
Read More
Introduction to Ransomware
In this blog post, we take a look at ransomware from a high-level, bre...
Read More

    Subscribe

    Stay up to date with cyber security trends and more