top of page


World-Class Cyber Services
Cyber Services Delivered with a CX
Search


Manual vs. Automated Penetration Testing: What You Need to Know
Both methods have their advantages and disadvantages, and choosing the right one depends on several factors.
Ben Card
Feb 12, 20245 min read
101 views
0 comments


Is AI Automation of Security Safe?
AI is increasingly being used in cybersecurity to protect against cyberattacks, but is it safe?
Ben Card
Sep 7, 20232 min read
17 views
0 comments


Severe Android Vulnerability Exploited by Chinese Actors
1 of 2 vulnerabilities recently added to the U.S. Cybersecurity and Infrastructure Security Agency has seen evidence of active exploitation
Ben Card
May 1, 20232 min read
19 views
0 comments


Best Practices for Effective Phishing Campaigns
10 Things You Can Do To Improve Your Phishing Campaigns
Ben Card
Mar 6, 20234 min read
87 views
0 comments


Ransomware Attacks Increase During Holidays & Weekends--When Security Teams Are Least Prepared
The primary causes of costly security breaches—and longer investigation times—is a combination of insufficient SOC staffing and....
Ben Card
Nov 29, 20223 min read
25 views
0 comments


New Use of Windows Security Bypass for Malware Delivery
Researchers have found that a new phishing attack is able to take advantage of a Windows zero-day flaw to deliver malware.
Ben Card
Nov 22, 20222 min read
18 views
0 comments


Security Awareness Training: A High-Value Program
Building a robust security awareness training program can help mitigate expensive risks poses by cybercrime.
Ben Card
Oct 27, 20224 min read
27 views
0 comments


Top 10 Things to Look for in a Pen Testing Vendor
What to Look for and what to Avoid When Choosing a Pen-testing Vendor or Provider
Ben Card
Sep 6, 20225 min read
307 views
0 comments


BLACKMATTER RANSOMWARE
How vulnerable are you? Even if you aren’t critical infrastructure, you too could be vulnerable.
Greg Johnson
Oct 19, 20211 min read
19 views
0 comments
bottom of page