Blog2021-03-25T19:15:41-04:00
Proprietary data, expert analysis and bold thinking for leaders who want to achieve the extraordinary.

The Gambia’s Central Bank Hack: The Need for NIST CSF and RMF

The recent cyberattack on The Gambia's Central Bank highlights the critical vulnerability of infrastructure to cyber threats, with hackers potentially stealing two terabytes of sensitive data. The incident underscores the urgent need for robust cybersecurity measures to protect against sophisticated attacks and safeguard personal information.

July 3rd, 2024|

SolarWinds Orion Countermeasures

The sophistication and audacious scale of the SolarWinds Orion attack is an inflection point for governments, organizations and security defenders worldwide. This post identifies the root causes and recommends unique technical and regulatory improvements.

January 28th, 2021|

Guide to CMMC Certification

CMMC was established to ensure greater cyber consistency from defense contractors and will be an absolute requirement to win DoD RFPs and/or have a contract awarded. Accelerate your readiness with our detailed guide.

January 7th, 2021|

5 Best Free VPNs in 2021

Is your VPN spying on you? Most VPNs fail to live up to their promise not to. With thousands to choose from, read our report to find out the 5 Best FREE VPNs the pros use that offer real anonymity on the world wide web, grant access to blocked content and secure all of your communication.

January 5th, 2021|

Avoid Having to Run Somewhere From Ransomware

Ransomware attacks continues to be one of the biggest risks today. Clicking on the wrong link could be enough to set off a sequence of events that ends with access to files denied until a ransom is paid. Read everything you never wanted to, but need to, know about ransomware to avoid becoming the next victim.

January 20th, 2020|

NYDFS Cybersecurity Regulation

Financial sector companies interested in doing business in New York, USA or already operating in the state must now comply with the NYDFS cyber law. We help you understand the rules and how to comply with them.

September 3rd, 2019|

Cyber Risk Board Oversight

The high-profile breach of Target's data reinforced that cyber security does not only impact IT but also the whole of a business. The resignation of the CEO and CIO underscored the repurcussions a cyber-incident can have on the confidence in an organization's leadership, market reputation, and shareholder value.

December 28th, 2017|

The Case for Audit

Admin Assistant Jane was considered a “trusted employee” by the non-profit’s CEO. Jane also happened to own a bridal business and was regarded a "fairy godmother" for having donated over a million dollars. So how was Jane able to pocket $5 million dollars over an eight-year period, undetected?

November 27th, 2016|

Cyberinsurance: Value Generator or Cost Burden?

Although larger companies may be equipped to weather a cyberstorm and its aftermath, 60% of small businesses close their doors within six months after an attack, making cybercrime an equal opportunity with unequal consequences. Some enterprises are beginning to consider cyberinsurance as a component of their risk transfer strategy.

October 11th, 2016|

Categories