Data is the lifeblood of a modern organization, driving decision-making and propelling growth. Data classification ensures its vitality by properly routing it for maximum efficiency and security. Volumes of data are generated, collected, stored, and analyzed by...
Blogs
What’s on the Horizon for Cybersecurity in 2024?
Another year is behind us, a year filled with remarkable advancements, jaw-dropping breaches, and the good guys still struggling to keep up with the bad guys. Before jumping into how 2024 may shape out or diving right into the doom and gloom of what went wrong in...
Streamlining Cybersecurity Using the DOD Replicator Initiative
The Department of Defense (DOD) has taken a bold step in addressing the need for more innovation and capabilities in fighting modern adversaries. Deputy Secretary of Defense Kathleen Hicks recently introduced the department’s new Replicator initiative intended to use...
Soaring to New Heights
As the celebrations of the holiday season wrap up and we step into the excitement of 2024, there’s an annual buzz in the air of the start of a new year and the untapped opportunities to come. It’s no coincidence that most of us spend the latter part of the previous...
SEC SolarWinds Filing: Forecasting the Fallout for CISOs
By now, most in the cybersecurity industry are aware of the recent filing by the Securities and Exchange Commission (SEC) against Timothy Brown, the CISO at SolarWinds, as a codefendant in a complaint against the company alleging fraud and internal control failures....
CrushFTP Critical Vulnerability CVE-2023-43177 Unauthenticated Remote Code Execution
Converge security researchers responsibly disclosed a critical unauthenticated zero-day vulnerability affecting the CrushFTP enterprise suite in August of 2023. With approximately 10,000 public instances and many more behind corporate firewalls, the vulnerability...
Using the 18 CIS Critical Security Controls to Drive Cybersecurity Priorities
“The changing threat landscape…” That phrase gets a lot of mileage in the cybersecurity industry. It is a simple truth that seems to require more and more complicated responses. You can clear the haze and put core security essentials back into focus with the Center...
How To Build The Right Foundation For New AI Tools
Artificial intelligence (AI) implementations have the potential to generate incredible business value, boost innovation, and speed digital transformation. However, organizations also face numerous challenges in executing a successful AI strategy. Enterprises are...