News & Updates
No items found.
CISA hosts Cyber Storm exercise with 200+ organizations

CISA hosts Cyber Storm exercise with 200+ organizations

CISA’s Cyber Storm exercise simulates a significant cybersecurity incident impacting critical infrastructure to improve risk management, incident response planning, information sharing and cyber response activities. 

Read More

Four security protocols to protect the new normal, a hybrid steady state

Four security protocols to protect the new normal, a hybrid steady state

 There are four security protocols to consider when reviewing an enterprise’s public cloud risk profile.

Read More

ISC StormCast for Wednesday, March 16th, 2022
Avoid costly cybersecurity turnovers during March Madness

Avoid costly cybersecurity turnovers during March Madness

Don’t get too caught up in the excitement of March Madness. Cybercriminals will use social engineering, phishing, malware, ransomware and other cybersecurity strategies to wreak havoc. Boost security defenses now.

Read More

Protecting the enterprise from lateral movement attacks

Protecting the enterprise from lateral movement attacks

Let’s look at lateral movement further and explore why it is important and how to minimize the impact of adversaries moving around your environment.

Read More

ISC StormCast for Tuesday, March 15th, 2022
ISC StormCast for Monday, March 14th, 2022
Listen to Josh Yavor, Tessian CISO, talk burnout among security teams and executives

Listen to Josh Yavor, Tessian CISO, talk burnout among security teams and executives

Josh Yavor, Chief Information Security Officer (CISO) at Tessian, talks about the “leap-of-faith” decision he made four years ago that helped address his own feelings of burnout, and how CISOs can lead by example, setting boundaries and accountability at the C-suite level.

Read More

User cybersecurity awareness starts with training

User cybersecurity awareness starts with training

Security leaders, employees and users all play a part in cybersecurity success. Implementing employee awareness programs and user education initiatives can help bridge an organization’s security gaps.

Read More

Load More