Our Blog

Stay updated with all the latest news and announcements

pic110

A Brief History

What is Threat Intelligence?

Threat intelligence has come a long way since its humble beginnings as a shared blacklist of malicious IP addresses and URLs.

read more



pic109

In 5 Steps

Fighting Back Against Ransomware

During the last year, 22% of businesses were forced to pause operations due to ransomware, often for days or weeks at a time.

read more



pic108

A Year of Consolidation

Top 10 Challenges Facing CISOs in 2023

While 2022 was certainly no walk in the park, strong cybersecurity investments and institutional support suggest a light at the end of the tunnel.

read more



pic107

Cybersecurity News

CISA Releases First Ever Cross-Sector CPGs. What's Inside?

CISA has finally released its highly anticipated Cross-Sector Cybersecurity Performance Goals in collaboration with DHS, NIST and numerous industry leaders.

read more



pic106

Cybersecurity Trends

Blockchain Security: A Brief Overview

While developing a cybersecurity strategy is critical for any business, the distributed nature of the blockchain introduces some interesting new challenges.

read more



pic105

Cybersecurity Trends

Common Blockchain Security Flaws

Blockchain has ushered in a new era of transparency, cryptography, and decentralization. However, there is still a long way to go to overcome glaring security challenges.

read more



pic104

And what caused them

Top Five Blockchain Breaches of 2022

Blockchain projects soared 700% in 2021. In the process, they've become extremely attractive targets for hackers across the globe.

read more



pic103

Guest Post

6 Tips for Retaining Top Cybersecurity Talent

Businesses now understand how important it is to protect their customers' and brands' personal data. However, retaining top cybersecurity talent isn't as easy as it sounds.

read more



pic102

Cybersecurity News

Are We At (Cyber) War With China?

On July 6th, the heads of the FBI and MI5 met in London to deliver an unprecedented joint warning regarding China's "game changing" cyber offensives.

read more



pic101

Guest Post

3 Ways The Metaverse Will Change Cybersecurity

Although coined way back in the mid-90s, there are many reasons why the metaverse is being touted as the future of the internet.

read more



pic100

In 5 Steps

Managing Cybersecurity During an Economic Downturn

As budgets tighten and teams shrink, cybersecurity leaders will be facing an impossible challenge: how to accomplish more with fewer resources.

read more



pic99

Including attack phases and timeline

Rating Russia's Cyber Warfare Capabilities

The Russian invasion of Ukraine was arguably the first war in history to combine the full power of an advanced kinetic and cyber arsenal.

read more



pic97

Cybersecurity Trends

What is Mutual Human Authentication?

MFA has proven itself to be one of the most impactful cybersecurity innovations in recent decades. But it's still not enough.        

read more



pic96

In Four Steps

How the Dark Web Can Protect Your Company

With 95% of the internet hosted on the Deep and Dark Webs, companies now have a valuable opportunity to leverage this data for positive purposes.     ...

read more



pic95

Cybersecurity Trends

Does Crypto Need a Cybersecurity Refresh?

A string of crypto thefts and security breaches have caused some to question the overall security of a rapidly growing industry.

read more



pic94

Cybersecurity Trends

Top 10 Challenges Facing CISOs in 2022

While 2021 presented some of the greatest security challenges in decades, it has also prompted government and industry leaders to prioritize cybersecurity.   

read more



pic93

Cybersecurity Trends

2021 Cybersecurity Roundup: Year in Review

In many ways, 2021 was the year that global supply chains were pushed to their limits, both physically and digitally.

read more



pic92

Silent Breach Labs

Update: Managing the Log4j Vulnerability

To help companies detect and mitigate the Log4j vulnerability, Silent Breach is offering a free advisory service. Contact us to learn more.

read more



Load More