By September 30, 2025, Microsoft will retire the legacy Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) policies. If your organization is still using the legacy policies, you’ll need to …
DMARC: Strengthening Trust in Your Email Domain
Written by: Kelsey Clark, Fortress SRM Security Innovation & Brand Strategy Leader The Hidden Risk Inside Your Inbox Email is the communication backbone of modern work, but it’s also a …
The Golden Triangle: Welcome to the Modern Wild, Wild, East (Part 2)
Professional & Organized: How the GTSEZ Encourages the Multi-functional Criminal Enterprise, and What To Do About It By Chuck Mackey Introduction In Part 1, we introduced you to the Golden …
The Golden Triangle: Welcome to the Modern Wild, Wild, East (Part 1)
Introduction In 2007, the Lao government, in collaboration with the Hong Kong-registered Kings Romans Group, established the Golden Triangle Special Economic Zone (GTSEZ)[1] in the Ton Pheung District of Bokeo …
Understanding the Known Knowns, Known Unknowns, and Unknown Unknowns in Cybersecurity
In cybersecurity, navigating the murky waters of risk management requires a deep understanding of the “known knowns,” “known unknowns,” and “unknown unknowns.” These concepts, borrowed from military strategy, are incredibly relevant as businesses face increasingly sophisticated cyber threats in a constantly shifting landscape.
How the Grinch Stole Your Cookies: A Christmas Tale of AiTM Phishing Attacks
In the bustling city of Cyberville, the holiday season was in full swing, while a sinister threat lurked in the shadows of the digital world.
A Quick Case Study in Zero Trust Architecture
By Chuck Mackey, Fortress Security Risk Management Senior Security Principal You work in a bustling hospital. Physicians, nurses, and administrative staff are constantly on the move, accessing patient records, medical …
Is Your Cyber Tech Stack the Right One?
Is your cybersecurity ecosystem future-ready, agile, and aligned with your business goals? If not, it’s time for a serious upgrade.
“My Data is Safe in the Cloud”—Truth or Dangerous Fallacy?
In the Cloud, safety is a shared responsibility—one that businesses must take seriously to protect their most valuable asset: their data.
Shadow IT – The Silent Cyber Threat Lurking in Your Organization
As cyber threats advance, Shadow IT represents an unnecessary vulnerability. With the right approach, organizations can close these gaps.
