amber64353Jun 86 minTop 5 Windows Configurations to Stop Attacks Background Keeping your organization safe from cyber threats is complicated. New vulnerabilities are uncovered every day. Software...
amber64353May 168 minUsing Ransomware Playbooks to Build More Secure Configuration StandardsSetting The Stage It’s a very rare moment when the Cybersecurity industry is able to obtain deep levels of insight from malicious...
amber64353May 57 minHow to Reduce Risk Through Configuration HardeningBackground Keeping your organization safe from cyber threats is harder today than ever. Attackers are becoming more sophisticated. They...
amber64353Mar 73 minWhen Meetings Go AwryBackground Each month we analyze data for several clients. In preparing for the meetings, we found some very interesting data for some...
Andy JordanApr 25, 20215 minVulnerability Management - Finding Your FundingOverview You’ve finally fought off the enough of the day-to-day issues that you can now focus on getting ahead of some of the security...
Andy JordanMar 22, 20212 minThe "NGS Approach" to Vulnerability ManagementVulnerability Management Framework For most organizations, Vulnerability Management programs have tragically been focused solely as an...
Andy JordanFeb 22, 20215 minUnderstanding “Risk Based Decisions” in CybersecurityBusiness leaders will often say they leverage "risk-based analysis" to help them make decisions. However, when asked which model or...