A Deep Dive Look at EMOTET Malware

By Edward Serafin III, C|EH, Security Architect Emotet: What is it? Emotet is a type…

Responding to InfoSec Questionnaires using CISO Advisory Services

Detection Security

LEVERAGING CISO ADVISORY SERVICES TO IMPLEMENT SECURITY PROGRAMS AND INCIDENT RESPONSE PROCEDURES

Leveraging The VCISO

HELPING A DEFENSE CONTRACTOR MEET REGULATORY GUIDELINES

Answering The Question

ANSWERING THE QUESTION – HOW SECURE DO WE NEED TO BE?

‘Tis the Season – A Cyber Awareness Gift from Micro Strategies – Part 2

The holidays are here. With this comes parties, family gatherings, and work functions. It’s also…

‘Tis the Season – A Cyber Awareness Gift from Micro Strategies

The holidays are here. With this comes parties, family gatherings, and work functions It’s also…

5 Questions To Ask Before Upgrading To A SIEM Solution

Protecting an organization against cyber-attacks is no small task. Information technology (IT) security teams have…

THOUGHTS FROM BLACK HAT USA 2019 & DEFCON 27 (PART 2)

By Edward Serafin, Chief Security Architect This blog is the second in a three-part series…