In 5 Steps
Managing Cybersecurity During an Economic Downturn
As budgets tighten and teams shrink, cybersecurity leaders will be facing an impossible challenge: how to accomplish more with fewer resources.
read more
Including attack phases and timeline
Rating Russia's Cyber Warfare Capabilities
The Russian invasion of Ukraine was arguably the first war in history to combine the full power of an advanced kinetic and cyber arsenal.
read more
Guest Post
9 Steps to Reducing Your Attack Surface
A recent report by Gartner names attack surface expansion as the leading cybersecurity trend to watch for in 2022.
read more
Cybersecurity Trends
What is Mutual Human Authentication?
MFA has proven itself to be one of the most impactful cybersecurity innovations in recent decades. But it's still not enough.
read more
In Four Steps
How the Dark Web Can Protect Your Company
With 95% of the internet hosted on the Deep and Dark Webs, companies now have a valuable opportunity to leverage this data for positive purposes. ...
read more
Cybersecurity Trends
Does Crypto Need a Cybersecurity Refresh?
A string of crypto thefts and security breaches have caused some to question the overall security of a rapidly growing industry.
read more
Cybersecurity Trends
Top 10 Challenges Facing CISOs in 2022
While 2021 presented some of the greatest security challenges in decades, it has also prompted government and industry leaders to prioritize cybersecurity.
read more
Cybersecurity Trends
2021 Cybersecurity Roundup: Year in Review
In many ways, 2021 was the year that global supply chains were pushed to their limits, both physically and digitally.
read more
Silent Breach Labs
Update: Managing the Log4j Vulnerability
To help companies detect and mitigate the Log4j vulnerability, Silent Breach is offering a free advisory service. Contact us to learn more.
read more
Top Three Risks
Securing the Cyber Supply Chain
While the global supply chain has only recently fallen into crisis, the digital supply chain has been under stress for years.
read more
And what to do about it
Why Hackers Love the Holidays
The strategy is simple. Wait until nearly all employees are away from the office. A long weekend, like Thanksgiving or July 4th, will do just fine. An extended break like Chri...
read more
Cybersecurity News
Cybersecurity Industry Scores Major Wins
The cybersecurity sector was met with a number of important victories, wrapping up what could be its best week in recent months.
read more
Cybersecurity Trends
Cyber Due Diligence: In Four Parts
As the newest addition to the due diligence process, cyber audits come in all shapes and sizes. Here are the main 4 components, along with accompanying case studies.
read more
Cybersecurity Trends
Securing Communication Channels in the Enterprise Environment
Back when WhatsApp released their new data-sharing policies, public outrage over privacy concerns caused users to flock to rivals like Signal and Telegram nearly overnight.
read more
Top Five Benefits
The Rise of the Virtual CISO
With daily headlines chronicling the latest data breaches, companies are under growing pressure to strengthen their cybersecurity defenses.
read more
Cybersecurity News
The US Government Failed Their Cybersecurity Audit. Now What?
From NASA to the State Department, federal agencies are relying on outdated systems, ignoring mandatory security patches and failing to protect classified data.
read more
Cybersecurity Trends
Top Four Cloud Security Tips for 2021
Today, over 95% of businesses utilize cloud computing. At the same time, companies often lack proper security protocols to manage this rapidly developing digital landscape.
read more
Cybersecurity News
Everything we know about the Kaseya ransomware attack
In what is considered to be the largest ransomware attack in history, a group of hackers have compromised at least 1000 companies in a stunning Fourth of July attack.
read more
Cybersecurity Trends
Attack Surface Management is Here to Stay
With new buzzwords being generated on a seemingly constant basis, it can be difficult to distinguish between passing fads and emerging trends.
read more
Silent Breach in the press
Silent Breach Breaches Department of Defense (DoD) Network
announcement
Silent Breach joins the Cyber Security Tech Accord
Silent Breach in the press