Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Moving from noisy threat feeds to focused intelligence that security teams can actually act on.

The FBI Buys Data to Track Movement, Location History

Director Patel stated the FBI purchases data that can be leveraged to track a person’s movement and location history.

Mexico Security Crisis: Never Waste a Crisis

The recent crisis in Mexico with the government actions against organized crime pressure tested company security programs to protect their people, property and reputation. 

8M Confidential Crime Tips Hacked, Compromised

A hacker group claimed to breach a platform used for submitting tips about criminal events. 

Trump’s Former Counter-Terrorism Official Investigated Over Alleged Leaks

Joe Kent is under investigation for alleged leaks of classified information

Stryker Update: FBI Seizes Website of Iran-Linked Hackers

The FBI has seized the website of the Iranian-linked hackers believed to be behind the recent cyberattack against Stryker. 

Threat Actors Target the Entire Retail Supply Chain

The full supply chain is at risk for cyberattacks.

GuardDog Telehealth Accesses Sensitive Medical Records Under False Pretenses

A telehealth organization accessed patient medical data in order to share it with law firms. 

Fear of Surveillance Leads to Increased VPN Use

Americans are using VPNs for additional privacy.

Document Protection: Why Hybrid Storage Is the Future of Security

Strategically choose which data lives on a server and which lives physically.