4 min
Consulting Services
Build Security Muscle Memory With Tabletop Exercises
What scrimmages were to football, tabletop exercises (TTX) are to incident response, business continuity, disaster recovery, vulnerability management, and other critical components of your organization’s security program.
5 min
SOAR
Grey Time: The Hidden Cost of Incident Response
The time cost of incident response for security teams may be greater – and more complex – than we’ve been assuming.
3 min
Security Strategy
Small Business in a Big World (Wide Web): What You Should Know to Stay Secure
In this blog, we share a number of tips to help small businesses decrease the chance of becoming a victim of a cyber-attack.
3 min
Vulnerability Management
12 Most Exploited Vulnerabilities: How to Navigate Vulnerabilities in a Security Program
Recently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) laid out the 12 most exploited vulnerabilities since 2016.