Do I Pay the Ransom? Insights from an Incident Responder
When people meet me, and I identify as a Cyber Incident Responder who has been a part of several ransomware extortion cases, everyone asks, “Should
When people meet me, and I identify as a Cyber Incident Responder who has been a part of several ransomware extortion cases, everyone asks, “Should
The alignment of cybersecurity initiatives with overarching business goals is not just a strategic advantage—it is a fundamental necessity. As the cyber threat landscape becomes
Description of the vulnerability per NIST: “Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex
Effective IT asset management (ITAM) is vital for maintaining a streamlined, secure, and efficient IT infrastructure. This detailed guide is structured around the three primary
The challenge of ensuring data privacy is paramount in today’s globally interconnected landscape, where an increasing number of businesses are adopting remote work models. Using strong
Announcing two new capabilities within our Managed Detection and Response (MDR) services, specifically designed to enhance the monitoring and security of your Microsoft 365 environment.
Understanding Social Engineering in the Digital Landscape In an era dominated by technology, the threat landscape for cybersecurity has evolved, with social engineering emerging as
The Payment Card Industry (PCI) Security Standards Council (SSC) develops standards and resources that help protect the people, processes, and technologies across the payment ecosystem
Background By day, I am a full-time Information Security professional with nearly 20 years of industry experience. I have worked for companies as small as
1420 NW Vivion Road, STE 102
Kansas City, MO 64118
3000 Riverchase Galleria, STE 700
Birmingham, AL 35244