top of page
World-Class Cyber Services
Cyber Services Delivered with a CX
Search
Ben Card
Feb 12, 20245 min read
Manual vs. Automated Penetration Testing: What You Need to Know
Both methods have their advantages and disadvantages, and choosing the right one depends on several factors.
97 views0 comments
Ben Card
Sep 7, 20232 min read
Is AI Automation of Security Safe?
AI is increasingly being used in cybersecurity to protect against cyberattacks, but is it safe?
17 views0 comments
Ben Card
May 1, 20232 min read
Severe Android Vulnerability Exploited by Chinese Actors
1 of 2 vulnerabilities recently added to the U.S. Cybersecurity and Infrastructure Security Agency has seen evidence of active exploitation
19 views0 comments
Ben Card
Mar 6, 20234 min read
Best Practices for Effective Phishing Campaigns
10 Things You Can Do To Improve Your Phishing Campaigns
86 views0 comments
Ben Card
Nov 29, 20223 min read
Ransomware Attacks Increase During Holidays & Weekends--When Security Teams Are Least Prepared
The primary causes of costly security breaches—and longer investigation times—is a combination of insufficient SOC staffing and....
25 views0 comments
Ben Card
Nov 22, 20222 min read
New Use of Windows Security Bypass for Malware Delivery
Researchers have found that a new phishing attack is able to take advantage of a Windows zero-day flaw to deliver malware.
17 views0 comments
Ben Card
Oct 27, 20224 min read
Security Awareness Training: A High-Value Program
Building a robust security awareness training program can help mitigate expensive risks poses by cybercrime.
27 views0 comments
Ben Card
Sep 6, 20225 min read
Top 10 Things to Look for in a Pen Testing Vendor
What to Look for and what to Avoid When Choosing a Pen-testing Vendor or Provider
307 views0 comments
Greg Johnson
Oct 19, 20211 min read
BLACKMATTER RANSOMWARE
How vulnerable are you? Even if you aren’t critical infrastructure, you too could be vulnerable.
19 views0 comments
bottom of page