Introduction: A New Era of Cyber Vigilance In an increasingly digitized financial landscape, the U.S....
Resources
News
View All
State Bar of Texas Ransomware Attack — A Lesson for Legal Firms
Overview—Could This Ransomware Breach Have Been Prevented? In mid-2023, the State Bar of Texas experienced a ransomware attack...
Dr. Mike Saylor to Present at this Year’s Secret Service Cybersecurity Conference — Spring 2025 NTCFTF Conference
Videos/Podcasts
View All
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Threat Advisories
View All
PEAKLIGHT Dropper Exploits Windows Systems via Pirated Movie Downloads to Deliver Malware
SUMMARY A novel dropper that launches PowerShell-based malware to infect Windows systems has been identified, which is distributed through...
Critical Kubernetes Flaw Exposes Clusters to Command Injection Attacks
SUMMARY A critical Kubernetes vulnerability allows attackers to execute command injection attacks, affecting default installations across...
OpenVPN Vulnerabilities Lead to RCE and LPE
SUMMARY Microsoft reported four medium-severity vulnerabilities in OpenVPN that could be combined to enable remote code...
Flyers
View All
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Blogs
View All
CISO’s Guide to Presenting Cybersecurity Metrics to Board Members
How to Use 3 Key Vulnerability Assessments to Present Cyber Security Threats Board members are increasingly recognizing cybersecurity as a top concern. Harvard Business Review surveyed 600 directors and found that 76% of board members believe they have made adequate investments in cybersecurity....
Navigating Uncertainty: An Essential Guide to Organizational Risk Assessments
Author: Tangela Sampson (Intern, Spring 2024) Introduction to Risk Assessments A Cybersecurity Risk Assessment is a structured and comprehensive procedure implemented within an organization to identify, evaluate, and manage potential risks, threats, or vulnerabilities originating from the...
Unveiling Risk: A Look into the Methodology and Importance of Vulnerability Assessments
Unveiling Risk: A Look into the Methodology and Importance of Vulnerability Assessments Author: Tangela Sampson (Intern, Spring 2024) A vulnerability assessment is a process of identifying security deficiencies and evaluating and categorizing potential vulnerabilities in an organization’s...





