Many organizations are still confused about what security assessments are, which ones do they need, and the kind of information that these assessments provide regarding their own security posture. In our LANTalks conversation “Breaking Down Security Assessments” we connected with James Roberts, Cybersecurity Analyst at Cyberstone Security, and discussed everything there is to know about […]

Vulnerability Assessment or Penetration Test – Which one should you do first?
Understanding fileless malware
Though fileless malware has been around much longer, it only became a mainstream method of cyberattack in 2017. With fileless malware, cybercriminals are able to use legitimate tools and services, such as existing software, applications, and authorized protocols, to carry out malicious activities like unauthorized data retrieval or data damage.

What Defense Contractors Need to Know About CMMC.
National security concerns highlight the importance of data security for defense companies! Beyond the threat to national security, cyberattacks can disrupt supply chains, increase costs, delay scheduling, and cause significant financial and reputational damage.