Follow Us:

Trusted Information Security Insights

Don’t Fall Victim to Cybersecurity Scare Tactics

Walk into any major cybersecurity conference, and you’ll feel like you are walking into the trailer for a horror movie.…

Written by Ron Schlecht Jr.

Cybersecurity has an M&A problem. CISOs should be wary.

The cybersecurity market is chaotic. New players frequently emerge, hyped as the next panacea for security woes, while incumbents are often acquired or merged with other businesses. While hype and rapid change is nothing new in any industry with the prefix “cyber” attached, it can be particularly troubling in cybersecurity, where finding the right partners is critical. Unfortunately, the rapid formation of startups, and the speed with which they are acquired makes it hard to know who to trust.…

Written by Ron Schlecht Jr.

Tony McFelin Joins BTB’s CISO Advisory Practice

Adding strategic expertise and depth to BTB's expanding CISO Advisory team Philadelphia, PA / March 18, 2019 / BTB Security, a leading cyber security assessment, advisory, and managed detection and response firm, today announced that Tony McFelin has joined the company’s growing CISO Advisory practice. Tony will work closely with clients to implement information security programs that are practical, effective, commensurate with risk, and aligned with their business goals.…

Written by Ron Schlecht Jr.

What trickle down cybersecurity means for your business

There you are, leading a startup as it gets its first shot at a big league contract with a major company. Everything is going great. The broad strokes of the agreement are worked out, and all that is left is for the lawyers to hash out the fine print.…

Written by Ron Schlecht Jr.

CVE-2018-8626 Microsoft DNS Vulnerability

What you need to know Vulnerability Background and Overview On Wednesday December 11, 2018 Microsoft released a security advisory for CVE-2018-8626 ( in parallel with a ‘Critical’ security update to address the issue. The Microsoft advisory contains very little information regarding the specific nature of the vulnerability, only that: It…

Written by BTB


Our clients trust us to keep their businesses resilient. How secure is your organization?
Schedule Consultation

Detect: Assessments & Testing

Defend: Comprehensive Monitoring

Defeat: Incident Response & Forensics