top of page
Search

Reduce Cyber Risk: Log, Configure, Manage
What happens in the network, which settings are correct, and the follow-up to manage the system are all important aspects of...
Katy Munden Hays
Jun 21, 20223 min read
28 views
0 comments

Reduce Cyber Risk: Control Who Gets Inside & How
It’s easy to say “just control who accesses your data.” Reducing fingers in the cookie jar makes it much easier to protect the cookies...
Katy Munden Hays
Jun 15, 20223 min read
39 views
0 comments

Reduce Cyber Risk: 11 Top Mitigations
Cybersecurity risks are everywhere. Here is the good news – there are ways to mitigate these risks, and to defend against increasing...
Katy Munden Hays
Jun 9, 20223 min read
52 views
0 comments

Too Many Risks: 10 Weak Cybersecurity Controls
What risks is your business taking unnecessarily? In the cybersecurity field, there are many risks to look for. CISA (Cybersecurity and...
Katy Munden Hays
Jun 1, 20223 min read
76 views
0 comments

Foundations of Computer Security: Level Up Your Cybersecurity Skills
We are committed to education as we test, solve, and teach for today's cybersecurity needs. This is a value we integrate into all of our...
Katy Munden Hays
May 27, 20223 min read
77 views
0 comments

Automated SOC: Future-Ready Security Today
It's important to look ahead to future needs. And right now, the future is clear on one point: cybersecurity services will be needed more...
Katy Munden Hays
May 18, 20223 min read
79 views
0 comments


There is Cyber Hope: Experts Give Simple Steps
There is cyber hope. That’s the feeling I had after this Expert Tips panel ended. These professionals work in the complex field of...
Katy Munden Hays
May 5, 20225 min read
59 views
0 comments


What Makes Good Cybersecurity Hygiene?
You probably know what you should do and have read about best practices. You may even have consulted with professionals and taken a few...
Katy Munden Hays
May 2, 20223 min read
44 views
0 comments


Cybersecurity Terms Q&A for Business Owners and Leaders
The world of cybersecurity can be difficult to navigate. You know you need it, but you have questions. We’re here to help. Here are the...
Katy Munden Hays
Apr 18, 20223 min read
60 views
0 comments

Is Cybersecurity Worth It? The High Cost of NOT Having a Cybersecurity Plan
Your business is worth protecting, and you’re actually losing valuable time and resources while you don't have a mature security plan.
Katy Munden Hays
Apr 5, 20223 min read
59 views
0 comments


Cyber Maturity Quiz: Is Your Organization Growing?
In our work as both a defensive and offensive cyber company, we hear these questions regularly: How do I get started with cybersecurity?...
Katy Munden Hays
Mar 22, 20222 min read
72 views
0 comments


Cybersecurity Strategy for Brilliant Leaders & Executives
Is anyone else tired of being called a Dummy when you get one of those books? You know, the kind that take technical terms and write them...
Katy Munden Hays
Mar 3, 20222 min read
145 views
0 comments


6 Mottos & Motives of Cyber Attackers
You have probably noticed that you cannot read the news without seeing reports of ransomware, data breaches, and cyber crime. But have...
Katy Munden Hays
Mar 1, 20222 min read
116 views
0 comments


Good Clean Cybersecurity Hygiene: The Top 4 Reasons You Need an Automated SOC in 2022
Have you set cybersecurity goals for this year? If not, it’s time to make a plan. Many people hesitate to get started because security...
Katy Munden Hays
Feb 21, 20223 min read
79 views
0 comments


Patrol Your Online Boundaries: Perimeter Visibility and OSINT Visibility
Do you know what is traveling in and out of your network? What kinds of information and files are crossing the boundary between internal...
Katy Munden Hays
Feb 1, 20222 min read
57 views
0 comments


Mind the Cybersecurity Gaps: Network Visibility and Host Visibility
You have identified and documented all your critical data and assets. (Read our last blog for this step.) Now it’s time to find the gaps...
Katy Munden Hays
Jan 27, 20223 min read
54 views
0 comments

What Do You Have to Lose? Well, a Lot.
It’s important to understand risk. And in order to understand any organization’s cybersecurity risks, you need to take inventory. If...
Katy Munden Hays
Jan 19, 20222 min read
66 views
0 comments


12 Days of Christmas Cyber Tips
We've spent all year telling you that cybersecurity doesn't have to be so hard. The world is always changing, and we're changing with it....
Katy Munden Hays
Dec 21, 20212 min read
98 views
0 comments


Interdependence and Cyber Change
We know we can always count on cyber change in the world, and that we must depend on each other to mitigate change. This is why...
Katy Munden Hays
Aug 3, 20212 min read
56 views
0 comments

Automated Security Operations Centers: Block Hacks and Thrive
As remote work continues and increases across the globe, the need for cybersecurity innovation is only growing, and we are constantly...
Katy Munden Hays
Apr 12, 20212 min read
479 views
0 comments
bottom of page