Blog

Header_strip
blog-bg-shape

Posts about:

Resources (2)

ChatGPT in the Workplace
Why to limit employee use, and what it means to your business ChatGPT,...
Read More
New MOVEit Transfer Vulnerability
A few days ago, a new vulnerability was discovered in the file transfe...
Read More
The Importance of Cybersecurity Awareness and Training Programs
In today's digital age, cybersecurity has become a critical concern fo...
Read More
Coming to the Table(top) for Incident Response
It's no secret that organizations are heavily reliant on technology to...
Read More
Introduction to Ransomware
In this blog post, we take a look at ransomware from a high-level, bre...
Read More
Three Steps to Address Regulatory Changes in 2023
Understanding Key Regulatory Changes 2023 brings changes in major regu...
Read More
Assessing Vulnerability Management Program Maturity
Assessing the maturity of your vulnerability management program Some o...
Read More
SOC 2 Evaluation Process
In our previous post introducing Systems and Organization Controls (SO...
Read More
2023 Threat Landscape & Ransomware
Diving into the mind of a ransomware actor: what will the 2023 threat ...
Read More
CISO Q&A: Cybersecurity Budgets
We asked budget questions to our community of Feats of Strength CISOs....
Read More
Communicating The Value of Security to Executives and the Board
For security leaders, talking to executive peers, senior management, a...
Read More
Using Password Data to Elevate Penetration Testing
One of the first things that comes to mind on the topic of security ar...
Read More
Quantitative vs. Qualitative Security Risk Assessments
After speaking with CISOs and security leaders on how they assess risk...
Read More
Risk Assessment Q&A
The scale of what risk assessments cover varies based on the provider,...
Read More
Digital Supply Chain Risk Management: What, Why and How to Handle it
Many people use the phrase “Digital Supply Chain Risk”, but it is ofte...
Read More

    Subscribe

    Stay up to date with cyber security trends and more