Category

Security News
// this is the search and dropdown stuff //
concept image depicting business continuity and disaster recovery plan

Disaster Recovery Best Practices That No One Talks About

This guide provides best practices for managing your business continuity (BC) and disaster recovery (DR) plans to protect your business
Concept image of data theft | beginner’s guide to ransomware

A Beginner’s Guide to Ransomware Attacks

Ransomware attacks are the number one security threat for companies. It’s critical to know how to respond to ransomware and...
network cables

A VPN Primer For The Modern Age

Once upon a time, virtual private networks (VPNs) were king in the world of remote security.  Road warriors and remote...
lighthouse with ocean waves

What Is DPF and Why US Companies Need to Care

On July 10, 2023, the European Union adopted the new EU-US Data Privacy Framework (DPF) program, quickly dubbed the ‘adequacy’...
fish hook

Phishing Attacks Are On The Rise

Phishing continues to be the primary means for unlawful entry into an organization, with attacks growing, year over year.   Security...
spider web with dew

Importance of a CMDB in Cyber Security

Most large organizations maintain some semblance of a configuration management database (CMDB) to track business resources, including IT hardware and...
Hand writing a chart

Elements of an Effective Compliance Program

As US regulations continue to compound, navigating constantly changing compliance pitfalls can be overwhelming for many businesses. Add on the...
hand typing on laptop

Truth in [AI] Advertising

With Black Kilt recently embarking on a new marketing journey, the influence of artificial intelligence (AI) on advertising and product...
person holding a cell phone and projecting a blue digital landscape

Affordable Cybersecurity Solutions for SMBs

With cyber-attacks on the rise, the cost implications to combat these threats can be overwhelming for small and even mid-sized...
hard drive with a faucet

Is Your IoT Leaking Data?

Voice control-using apps such as Siri, Alexa, Google, and others as well as hardware devices to control home automation are...
1 2 3 4