RESOURCES

Browse our resources and subscribe to our LinkedIn newsletter for more insights into why organizations choose us to protect their systems.

Resources
fasthttp
fasthttp Used in New Bruteforce Campaign
13 January 2025
fasthttp Used in New Bruteforce Campaign Djurre (DJ) Hoeksema, James Rigdon, and Benjamin Jones| January 13th, 2025 Fasthttp User Agent On January 13th,...
Deepfake Fraud
Combating Deepfake Fraud is a Growing Challenge for Organizations
10 January 2025
Combating Deepfake Fraud is a Growing Challenge for Organizations Christopher Eaton | January 10th, 2025 During a virtual conference call with organizational...
EDR Silencers
Responding to the Exigent Emergence of EDR Silencers
06 December 2024
Responding to the Exigent Emergence of EDR Silencers Christopher Eaton | December 6th, 2024Cyber threat actors consistently adjust their techniques, tactics,...
Illusion of Invulnerability
How the Illusion of Invulnerability Can Elevate Business Risk
22 November 2024
How the Illusion of Invulnerability Can Elevate Business Risk Christopher Eaton | November 22nd, 2024One aspect of the human condition, which some researchers...
Critical Role of Annual Assessments
The Critical Role of Annual Assessments for Preventative Cyber Care
11 November 2024
The Critical Role of Annual Assessments for Preventative Cyber Care Christopher Eaton | November 11th, 2024Global health organizations from the Centers...
Cybersecurity Measures
Enhancing Cybersecurity Measures for Business Continuity
29 October 2024
Enhancing Cybersecurity Measures for Business Continuity Christopher Eaton | October 29th, 2024Cyber threats are top of mind for many individuals, businesses,...
Evolving Threat Landscape
An Examination of the Evolving Threat Landscape to Support Cyber Maturity
10 October 2024
An Examination of the Evolving Threat Landscape to Support Cyber Maturity Christopher Eaton | October 10th, 2024A common trope in cybersecurity writing...
Fully-Managed Cyber Services
How Fully-Managed Cyber Services Can Impact Organizational Decision-Making
26 September 2024
How Fully-Managed Cyber Services Can Impact Organizational Decision-Making Christopher Eaton | September 26th, 2024Research indicates human adults make...
More Cyber Resilient
Why Aren’t Individuals & Businesses More Cyber Resilient?
13 September 2024
Why Aren’t Individuals & Businesses More Cyber Resilient? Christopher Eaton | September 13th, 2024For those who either work in or closely with cybersecurity...
Crucial Role of the SOC
The Crucial Role of the SOC & Its Team in Today's Cyber Landscape
30 August 2024
The Crucial Role of the SOC & Its Team in Today’s Cyber Landscape Christopher Eaton | August 30th, 2024In today’s hyper-connected world, cyber...
Mitigation Strategies
Understanding the Latest Threats and Mitigation Strategies to Better Secure the Cloud
28 August 2024
Understanding the Latest Threats and Mitigation Strategies to Better Secure the Cloud Christopher Eaton | August 28th, 2024The treachery and evolution...
CMMC 2.0 Framework
In Preparation for the Release of the CMMC 2.0 Framework
02 August 2024
In Preparation for the Release of the CMMC 2.0 Framework Christopher Eaton | August 2nd, 2024Cybersecurity frameworks and standards are crucial for organizations...
Defend the Global Supply Chain
Resolve to Strengthen and Defend the Global Supply Chain
15 July 2024
Resolve to Strengthen and Defend the Global Supply Chain Christopher Eaton | July 15th, 2024Every new year brings with it new causes to celebrate and numerous...
mitigate cyber risk
Mitigate Cyber Risk by Building a Security Program Focused on the Basics
15 July 2024
Mitigate Cyber Risk by Building a Security Program Focused on the Basics Christopher Eaton | July 15th, 2024Cyber threats are top of mind for many individuals,...
Managing Third Party Risk
Managing Third-Party Risk Poses Significant Challenges for Contracting Businesses
11 July 2024
Managing Third-Party Risk Poses Significant Challenges for Contracting Businesses Christopher Eaton | July 11th, 2024It is all too common for organizational...
effective healthcare
Effective Healthcare Requires Strengthened Cybersecurity for Patient Care and Protection
11 July 2024
Effective Healthcare Requires Strengthened Cybersecurity for Patient Care and Protection Christopher Eaton | July 11th, 2024It would be a tremendous understatement...
CDK Global Cyberattack
CDK Global Cyberattack, FTC Safeguards, and How SpearTip Can Help
20 June 2024
CDK Global Cyberattack, FTC Safeguards, and How SpearTip Can Help Christopher Eaton | June 20th, 2024A global car dealership SaaS (Software as a Service)...
SaaS Landscape
Examining the SaaS Landscape Through the Annual Security Survey Report
20 June 2024
Examining the SaaS Landscape Through the Annual Security Survey Report Christopher Eaton | June 20th, 2024Imagine a world where data flows seamlessly,...
Building a Strong Organizational Culture
Building a Strong Organizational Culture to Manage Cyber Risk
06 June 2024
Building a Strong Organizational Culture to Manage Cyber Risk Christopher Eaton | June 6th, 2024Maintaining a strong cybersecurity posture is more necessary...
NIST Cybersecurity Framework
NIST Cybersecurity Framework 2.0 and Its Value for Organizations
23 May 2024
NIST Cybersecurity Framework 2.0 and Its Value for Organizations Christopher Eaton | May 23rd, 2024The National Institute of Standards and Technology (NIST)...
1 2