Let’s Talk About Malware!
Michael Anglen and Martin Voelk discuss ransomware and other topics. View Here
Virtual CISO Benefits
For organizations that are facing regulatory compliance mandates, having an experienced security expert on staff is essential. The addition of a Chief Information Security Officer (CISO) in-house can be difficult and hiring a full-time employee requires additional headcount, onboarding time, and resources. By hiring a virtual CISO, you gain all of the benefits of an […]
Log4J Attacks!
More than 1.2 million attacks against companies have been made through the Log4J vulnerability since last Friday. According to the cyber security group Check Point, attacks after 12 hours were 40,000, and then it jumped to 800,000 after 72 hours. Their data suggests that the attacks are increasing. Very clearly, this is presenting itself as […]
THE LOG4J EXPLOIT, ARE YOU VULNERABLE?
A major security flaw in the Java logging package of log4j has been discovered. The Log4j vulnerability is an extremely easy exploit; attackers are scanning the internet for vulnerable systems, using Log4j to install Coin Miners and remote access tools like Cobalt Strike to enable credential theft, which can be used to steal data. If […]
5 Ways to Elevate Your State of Protection
Organizations are under constant threat of cyberattacks and data breaches, making it essential for them to maintain a high level of security. But, how can organizations elevate their state of protection? In this E-book, we’ll look at five ways to do just that. From the importance of MFA to investing in the right tools and […]
CMMC: The Next Frontier In Cybersecurity
The US Federal Government declared that all Suppliers to the US Department of Defense (Prime or Subcontractors) must comply with the Cybersecurity Maturity Model Certification (CMMC) requirements. Suppliers that act early will benefit from preferential treatment. To set your business up for long-term success, DoD Suppliers should start investing in CMMC now. The benefits of being an […]
PANEL DISCUSSION: “CMMC & THE RACE TO REMAIN COMPETITIVE WITH DOD CONTRACTS”
Gigit Hosts Live March Panel Discussion, “CMMC & The Race to Remain Competitive with DoD Contracts” Boulder, CO (March 5, 2021) – Gigit, Inc. (https://gigitsecurity.com), a cybersecurity firm with supply chain expertise that ensures compliance and reduces cybersecurity risk through its testing, assessment, and consulting services, today announced it will be hosting a live “Lunch and […]
Confused by CUI?
Controlled Unclassified Information (CUI), more commonly known among the Defense Industrial Base as “CUI,” presents today’s defense contractors with a challenging conundrum:To even know if their business has CUI, and what of their information is or is not CUI. In this free, downloadable guide, Gigit addresses the “CUI Conundrum” issue head-on, providing a detailed break-down […]
The 6 Correlation Factors Between M&A and Cybersecurity
Say you’re a looking to grow your company. There are any number of ways you can go about doing this, most popularly organically, through investors, or by acquiring other companies. In the latter situation, you may have different intentions in mind for an acquisition. For instance… You want to move into a geographical territory rapidly […]