DeepSeek AI, a Chinese artificial intelligence platform, has recently made waves with its advanced capabilities, rivaling top AI models from OpenAI and Meta. However, its rise has not been without …
Understanding the Known Knowns, Known Unknowns, and Unknown Unknowns in Cybersecurity
In cybersecurity, navigating the murky waters of risk management requires a deep understanding of the “known knowns,” “known unknowns,” and “unknown unknowns.” These concepts, borrowed from military strategy, are incredibly relevant as businesses face increasingly sophisticated cyber threats in a constantly shifting landscape.
Security & Threat Updates – January 2025:
Microsoft addressed 159 Common Vulnerabilities and Exposures (CVE’s) this month with 8 marked as zero-day vulnerabilities. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: Microsoft Vulnerabilities: Windows …
How the Grinch Stole Your Cookies: A Christmas Tale of AiTM Phishing Attacks
In the bustling city of Cyberville, the holiday season was in full swing, while a sinister threat lurked in the shadows of the digital world.
A Quick Case Study in Zero Trust Architecture
By Chuck Mackey, Fortress Security Risk Management Senior Security Principal You work in a bustling hospital. Physicians, nurses, and administrative staff are constantly on the move, accessing patient records, medical …
Security & Threat Updates – December 2024:
Microsoft addressed 74 Common Vulnerabilities and Exposures (CVE’s) this month, 1 which was marked as zero-day vulnerability. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: Microsoft Vulnerabilities: …
Is Your Cyber Tech Stack the Right One?
Is your cybersecurity ecosystem future-ready, agile, and aligned with your business goals? If not, it’s time for a serious upgrade.
“My Data is Safe in the Cloud”—Truth or Dangerous Fallacy?
In the Cloud, safety is a shared responsibility—one that businesses must take seriously to protect their most valuable asset: their data.
Shadow IT – The Silent Cyber Threat Lurking in Your Organization
As cyber threats advance, Shadow IT represents an unnecessary vulnerability. With the right approach, organizations can close these gaps.
Security & Threat Updates – November 2024:
Microsoft addressed 89 Common Vulnerabilities and Exposures (CVE’s) this month, 6 which were marked as zero-day vulnerabilities. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: Microsoft Vulnerabilities: …
The Critical Role of Adaptive Enterprise Resiliency in Cybersecurity
In the modern cybersecurity landscape, adaptive enterprise resiliency has emerged as one of the most critical factors in determining whether a company can weather the storm of a cyber-attack. It’s no longer just about preventing breaches but also about how quickly and effectively an organization can react when one occurs. Resiliency in this context is not static; it’s dynamic, responsive, and adaptable.
Fortress Security Risk Management and Binary Defense Forge Strategic Alliance to Elevate and Broaden Cybersecurity Solution
Fortress Security Risk Management and Binary Defense announce an exciting strategic partnership to offer an enhanced suite of cybersecurity services.