SEPETMBER 18, 2020

Supply Chain Shock: The SolarWinds Breach

The discovery of the SUNBURST backdoor has shaken the cybersecurity world. We analyze the supply chain vulnerabilities exposed by this attack and what it means for enterprise defense strategies moving forward.

Read Analysis
🔒
June 12, 2025

The Rise of Double-Extortion Ransomware

Ransomware groups are no longer just encrypting data; they are threatening to release it. Learn about the new tactics used by threat actors this summer and how to ensure your backups are resilient.

Read Full Report
🖧
March 24, 2025

Securing the Remote Workforce

With the sudden global shift to working from home, perimeter security models are failing. We outline the critical steps for securing VPNs, RDP endpoints, and employee devices outside the corporate firewall.

View Checklist
💻
January 15, 2025

Do we really need to replace our exising system?

In my first blog post, I wanted to see a trend where organizations end up spending lots of money on the "latest and greatest" applications and hardware with a focus on enhancing cybersecurity. But do you really have to? Perhaps you already have the tools in you existing system. Let's dive more into it.

Our Approach