Filter By Topic
Filter By Industry

3 Energy and Utilities Cybersecurity Trends You Can’t Miss

Increasing attacks highlight the need for utilies cybersecurity. We discuss our thoughts on three trends in this blog.

Pen Testing to Protect the Water Supply

We helped a large water utility company conduct a penetration test to comply with government regulations and protect their systems.

Building Business Resilience with a Solid Cybersecurity Strategy

Learn why a solid cybersecurity strategy is crucial for building business resilience and how to align your security posture with objectives.

Microsoft Defender for Endpoint: What It Is, What It Does, Who Needs It

Microsoft Defender for Endpoint is a security solution that protects endpoints from cyber threats. We explore what it is and who needs.

What Your Pen Test Isn’t Showing You: A Live Hack Webinar Recap

Our on-demand webinar showcases the importance of a comprehensive penetration test through a live network attack simulation.

Do You Know Your Microsoft Secure Score?

Secure Score analyzes and assigns a score to your Microsoft 365 security based on your settings and regular activities. Learn how.

What Your Pen Test Isn’t Showing You: A Live Hack

Watch our on-demand webinar to see a live hack and learn why penetration testing is an important part of your cybersecurity program.

What You Need to Know About Microsoft Defender for Cloud

Learn about the stages, policies and features of Azure Security Center, a cloud security service for Microsoft Office 365.

Boost Your Penetration Testing with 4 Actionable Tips

Our cyber risk management experts cover four ways to optimize your penetration testing for better cybersecurity.

Smart Vendor Security Is Key To Avoiding A Data Breach In 2024

Vendor security management is an important part of cybersecurity. Larry shares four areas to keep in mind to prevent a data breach.

Cloud Security: Understanding Your Responsibilities and Threats

We discuss the roles and responsibilities of maintaining cloud security for your business, and we share 10 security concerns to keep in mind.

Security Exceptions: The Ultimate Weakness to a Secure Environment

This blog covers the risks of creating security exceptions and how to reengineer the process to maintain a secure environment.