Our Blog

Stay updated with all the latest news and announcements

pic92

Silent Breach Labs

Update: Managing the Log4j Vulnerability

To help companies detect and mitigate the Log4j vulnerability, Silent Breach is offering a free advisory service. Contact us to learn more.

read more



pic91

Top Three Risks

Securing the Cyber Supply Chain

While the global supply chain has only recently fallen into crisis, the digital supply chain has been under stress for years.

read more



pic90

And what to do about it

Why Hackers Love the Holidays

The strategy is simple. Wait until nearly all employees are away from the office. A long weekend, like Thanksgiving or July 4th, will do just fine. An extended break like Chri...

read more



pic89

Cybersecurity News

Cybersecurity Industry Scores Major Wins

The cybersecurity sector was met with a number of important victories, wrapping up what could be its best week in recent months.

read more



pic88

Cybersecurity Trends

Cyber Due Diligence: In Four Parts

As the newest addition to the due diligence process, cyber audits come in all shapes and sizes. Here are the main 4 components, along with accompanying case studies.

read more



pic87

Cybersecurity Trends

Securing Communication Channels in the Enterprise Environment

Back when WhatsApp released their new data-sharing policies, public outrage over privacy concerns caused users to flock to rivals like Signal and Telegram nearly overnight.

read more



pic86

Top Five Benefits

The Rise of the Virtual CISO

With daily headlines chronicling the latest data breaches, companies are under growing pressure to strengthen their cybersecurity defenses.

read more



pic85

Cybersecurity News

The US Government Failed Their Cybersecurity Audit. Now What?

From NASA to the State Department, federal agencies are relying on outdated systems, ignoring mandatory security patches and failing to protect classified data.  

read more



pic84

Cybersecurity Trends

Top Four Cloud Security Tips for 2021

Today, over 95% of businesses utilize cloud computing. At the same time, companies often lack proper security protocols to manage this rapidly developing digital landscape.

read more



pic83

Cybersecurity News

Everything we know about the Kaseya ransomware attack

In what is considered to be the largest ransomware attack in history, a group of hackers have compromised at least 1000 companies in a stunning Fourth of July attack.

read more



pic81

Cybersecurity News

Are the JBS and Colonial attacks just the beginning?

While the recent attacks on the JBS plants and the Colonial Pipeline are far from unique, the tangible nature of the damage hits close to home.    

read more



pic80

Cybersecurity Trends

Top Four Benefits of Attack Surface Management

As Attack Surface Management (ASM) begins to gain traction, here are the top four reasons why it may be the right fit for your organization.     

read more



pic79

Cybersecurity News

SmileDirect Becomes Latest Victim in String of Cyberattacks

SmileDirectClub, a celebrated tele-dentistry company, just lost over 15% of their market value in under 15 minutes. The cause? A cyber security breach from two weeks ago.

read more



pic78

Guest Post

Introduction to Vishing

When you receive a call on your phone from an unknown number, it's nearly impossible to guess who's calling. Increasingly, it could be someone vishing you.   

read more



pic77

Cybersecurity News

Inside Biden's Plan to Protect the Power Grid from Hackers

The Biden Administration has announced plans to launch a '100-day sprint' to shore up the US power grid against cyber-attacks.  

read more



pic76

Cybersecurity News

UN Passes Critical Cybersecurity Resolution

In the wake of the SolarWinds and Microsoft attacks, the UN has released a landmark cybersecurity report that's been two years in the making. Here's what you need to know.

read more



pic75

Cybersecurity Alert

How To Tell If The Microsoft Hack Affects You

Since January '21, hackers have been exploiting multiple vulnerabilities in Microsoft Exchange Server to infiltrate a broad range of systems. Here's what you need to know.

read more



pic74

Cybersecurity Trends

What is Attack Surface Management?

Unfortunately, organizations across nearly every sector are still struggling to secure their public-facing applications.

read more



Load More