Articles

Weaponized AI: Banking’s Newest Nightmare

When AI Becomes a Criminal's Best Tool Dark Models + Deeper Threats The Numbers Don’t Lie. From the data coll...

EDR Testing: Turning Promises into Proof

Why deploying EDR is only the beginning . . . Installing an EDR system doesn’t automatically guarantee protection. It may show a healthy status on its dashboard, but that doesn’t prov...

Wrapping Up “Sean Awareness Month”

And now it's the Team's turn... So, if you are keeping up with our blog, or getting our email announcements (which you can sign up for here if you are not), you undoubtedly know that ...

Data Breach Laws: A State-by-State Framework

What you need to know for compliance coast-to-coast. Starting back in the year 2020 we unwittingly began an annual tradition by posting an article containing links to data breach laws...

Our Vulcan

When I first met Sean, I found him to be very reserved and “Spock-like.” A couple of beers in, I stressed, “Spock, in a good way.”Now here we are, 20 years later, and I’m writing my first blog post, in an act of respect, to say that Mr. Waugh ha...

Breach Frequency Spurs Monitoring Demands

An interesting study that gives a look into MSP worries... In a recent survey conducted by Cyber Smart, several MSP’s and MSSP’s shed light on factors impacting them and their Client’...