Follow Us:

Trusted Information Security Insights

What trickle down cybersecurity means for your business

There you are, leading a startup as it gets its first shot at a big league contract with a major company. Everything is going great. The broad strokes of the agreement are worked out, and all that is left is for the lawyers to hash out the fine print.…

Written by Ron Schlecht Jr.

CVE-2018-8626 Microsoft DNS Vulnerability

What you need to know Vulnerability Background and Overview On Wednesday December 11, 2018 Microsoft released a security advisory for CVE-2018-8626 ( in parallel with a ‘Critical’ security update to address the issue. The Microsoft advisory contains very little information regarding the specific nature of the vulnerability, only that: It…

Written by BTB

Data Privacy in the European Union: Becoming Compliant with New Protection Measures

The legislative action of the General Data Protection Regulation 2016/679 (GDPR) intends to unify and strengthen data protection for all individuals within the European Union (EU). There are still controversial topics surrounding this regulation, and a great deal of conversation will surely take place. This brief Solution Guide provides the most important things you need to know in an easy-to- understand format.…

Written by Matthew Wilson

Cybersecurity in New York State: Remaining Compliant with Emerging Regulations

Emerging financial regulations can seem complex and intimidating. The NY State Department of Financial Services recently established cybersecurity requirements for all financial-services companies operating within the state. This brief Solution Guide provides the most important things you need to know in an easy-to-understand format.…

Written by Ron Schlecht Jr.

The True Cost of a Security Operations Center (SOC)

Knowing the true cost of your SOC—including capital, payroll, recurring expenses, and care—prevents wasteful spending and keeps your operation lean. Our dedicated information security experts can show you how careful planning and wise use of resources can keep your data secure and your bottom line healthy—two things previously thought to…

Written by Matthew Wilson


Our clients trust us to keep their businesses resilient. How secure is your organization?
Schedule Consultation

Detect: Assessments & Testing

Defend: Comprehensive Monitoring

Defeat: Incident Response & Forensics