Overview—Could This Ransomware Breach Have Been Prevented? In mid-2023, the State Bar of Texas experienced a ransomware attack...
Resources
News
View All
Dr. Mike Saylor to Present at this Year’s Secret Service Cybersecurity Conference — Spring 2025 NTCFTF Conference
Emerging Threat: Invisible Unicode Phishing Attacks
Overview Cybercriminals are continually evolving their tactics to bypass security measures, and a new phishing attack leveraging an advanced...
Videos/Podcasts
View All
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Threat Advisories
View All
Black Basta Ransomware Gang Changes Tactics
Summary The Black Basta ransomware gang has changed tactics since the disruption of its partner QBot. The group is now employing new custom...
Threat Advisory *CRITICAL* – CrowdStrike Causing Widespread Global Outages
CrowdStrike Causing Widespread Global Outages Summary An update pushed out by CrowdStrike within the past 12 hours has caused widespread...
Exim Mail Server Flaw
Exim Mail Server Flaw Summary A critical security vulnerability has been identified in the Exim mail transfer agent, potentially allowing...
Flyers
View All
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Blogs
View All
CISO’s Guide to Presenting Cybersecurity Metrics to Board Members
How to Use 3 Key Vulnerability Assessments to Present Cyber Security Threats Board members are increasingly recognizing cybersecurity as a top concern. Harvard Business Review surveyed 600 directors and found that 76% of board members believe they have made adequate investments in cybersecurity....
Navigating Uncertainty: An Essential Guide to Organizational Risk Assessments
Author: Tangela Sampson (Intern, Spring 2024) Introduction to Risk Assessments A Cybersecurity Risk Assessment is a structured and comprehensive procedure implemented within an organization to identify, evaluate, and manage potential risks, threats, or vulnerabilities originating from the...
Unveiling Risk: A Look into the Methodology and Importance of Vulnerability Assessments
Unveiling Risk: A Look into the Methodology and Importance of Vulnerability Assessments Author: Tangela Sampson (Intern, Spring 2024) A vulnerability assessment is a process of identifying security deficiencies and evaluating and categorizing potential vulnerabilities in an organization’s...




