Security and Maturity: Today’s CIOs Take Center Stage

About a decade ago, the CIO’s main goal was to oversee a team to manage the technology of a company and control costs. Annual IT initiatives often included finding ways to take something expensive — existing technology — and make it cheaper so that the budget could be used for other initiatives. Innovating or delivering …

Read more

Why Your Mid-market Company Needs an MSSP

Keeping your business secure from cyber threats keeps getting more complicated. Even companies that previously thought they weren’t targets due to their size or industry know they need to adjust their thinking — cybersecurity vigilance is today’s reality. Mid-market companies that need to update their security controls are particularly at risk. Cybercriminals know that mid-market …

Read more

Zero-Day Attacks and Zero-Trust: Clearing Up “Zero” Confusion

A zero-day attack can cripple a company. A “zero trust” strategy protects a company. But can a zero trust strategy prevent a zero-day attack that exploits a zero-day vulnerability? No, but it can help contain it. Let’s clarify any confusion caused by all these “zeros.” Zero…what? The article Stop Zero-Day Attacks With Zero Trust and …

Read more

Mass Tech Layoffs Are a Correction, Not the End of the Tech-Talent Shortage

There’s been a lot of talk about how big tech’s mass layoffs are easing the tech talent shortage. But the facts don’t show any change in the availability of qualified tech talent. Even when you combine all the layoffs over the past 18 months — Google, Meta, Microsoft, Amazon, Twitter, Lyft — the total is not significant …

Read more

Cybercriminals Are Using ChatGPT for Phishing — What Should Your Company Do?

Until now, one of the easiest ways to spot a phishing email has been spelling or grammatical errors — but ChatGPT has changed all that. With the popular AI-driven chatbot spinning out prose faster than you can say “write my term paper,” everyone now needs to be suspicious of even the most well-written emails. ChatGPT’s ability …

Read more

Report Highlights Vulnerabilities That Put 30,000 Machines at Risk

Cybersecurity company Forescout has released a report detailing 56 very concerning security gaps they discovered across a string of devices used in industrial equipment, including devices used by manufacturers, distributors, and building automation. The devices were sold by 10 well-established operational technology (OT) vendors, including Honeywell, Ericsson, and Motorola, among others, and included products being …

Read more

Legacy Systems: The Preferred Path for Hacker Attacks

If your company has been relying on one or more legacy systems and they’ve run smoothly for many years, you may think they don’t need much attention — you can continue with SOP. But the opposite may be true. Organizations that fail to update and remediate vulnerabilities in their legacy systems are putting those systems …

Read more

SASE or SSE? There Isn’t a One-Size-Fits-All Approach to Security

In 2019, Gartner Research introduced a new enterprise networking and security category they called secure access service edge (SASE). SASE (pronounced “sassy”) combines a suite of both network and security services into a single, integrated cloud service. By bundling these services together, a single vendor can offer their customers better security and reduce the risk …

Read more