The Tempo of Cybersecurity

The Tempo of Cybersecurity

You are probably thinking to yourself, “oh great, another cybersecurity article”. I feel the same way sometimes, that I’ve become numb to the statistics, and I just want to go back to a time when we didn’t have to consider unscrupulous threat actors trying to take...
RVA is an Annual Wellness Visit for Your Business

RVA is an Annual Wellness Visit for Your Business

If you are anything like me, you may not like going to the doctor. It’s nothing against doctors, it’s just that in most cases if you are seeing the doctor something is probably wrong. Something hurts, something does feel right, something doesn’t look right, and so on....
The Acronym Soup of Endpoint Security – AV/NGAV/EDR/MDR

The Acronym Soup of Endpoint Security – AV/NGAV/EDR/MDR

Do you ever miss the stories that started “back in my day”? I used to spend weekends at my grandpa’s house helping with chores like mowing the yard or running around the chicken coups. We’d watch black and white western shows on television and then he’d tell me about...
What is and why you need a SIEM/SOC

What is and why you need a SIEM/SOC

Everyday, countless businesses are targeted for attack by malicious hackers. It’s no longer a matter of if. This was highlighted by an experiment run by Sophos, a data security company. Sophos sought to identify how quickly attackers would be able to identify a...
The Modern Digital Warzone

The Modern Digital Warzone

Cybersecurity often shares many comparisons to military and borrows many concepts and terminology from the forces. For example, the Lockheed Martin Cyber Kill Chain is borrowed from a military concept related to the structure of an attack consisting of target...