Katy Munden Penner6 days ago3 minReduce Cyber Risk: Log, Configure, ManageWhat happens in the network, which settings are correct, and the follow-up to manage the system are all important aspects of...
Katy Munden PennerJun 153 minReduce Cyber Risk: Control Who Gets Inside & HowIt’s easy to say “just control who accesses your data.” Reducing fingers in the cookie jar makes it much easier to protect the cookies...
Katy Munden PennerJun 93 minReduce Cyber Risk: 11 Top MitigationsCybersecurity risks are everywhere. Here is the good news – there are ways to mitigate these risks, and to defend against increasing...
Katy Munden PennerJun 13 minToo Many Risks: 10 Weak Cybersecurity ControlsWhat risks is your business taking unnecessarily? In the cybersecurity field, there are many risks to look for. CISA (Cybersecurity and...
Katy Munden PennerMay 273 minFoundations of Computer Security: Level Up Your Cybersecurity SkillsWe are committed to education as we test, solve, and teach for today's cybersecurity needs. This is a value we integrate into all of our...
Katy Munden PennerMay 183 minAutomated SOC: Future-Ready Security TodayIt's important to look ahead to future needs. And right now, the future is clear on one point: cybersecurity services will be needed more...
Katy Munden PennerMay 55 minThere is Cyber Hope: Experts Give Simple StepsThere is cyber hope. That’s the feeling I had after this Expert Tips panel ended. These professionals work in the complex field of...
Katy Munden PennerMay 23 minWhat Makes Good Cybersecurity Hygiene?You probably know what you should do and have read about best practices. You may even have consulted with professionals and taken a few...
Katy Munden PennerApr 183 minCybersecurity Terms Q&A for Business Owners and LeadersThe world of cybersecurity can be difficult to navigate. You know you need it, but you have questions. We’re here to help. Here are the...
Katy Munden PennerApr 53 minIs Cybersecurity Worth It? The High Cost of NOT Having a Cybersecurity PlanYour business is worth protecting, and you’re actually losing valuable time and resources while you don't have a mature security plan.
Katy Munden PennerMar 222 minCyber Maturity Quiz: Is Your Organization Growing?In our work as both a defensive and offensive cyber company, we hear these questions regularly: How do I get started with cybersecurity?...
Katy Munden PennerMar 32 minCybersecurity Strategy for Brilliant Leaders & ExecutivesIs anyone else tired of being called a Dummy when you get one of those books? You know, the kind that take technical terms and write them...
Katy Munden PennerMar 12 min6 Mottos & Motives of Cyber AttackersYou have probably noticed that you cannot read the news without seeing reports of ransomware, data breaches, and cyber crime. But have...
Katy Munden PennerFeb 213 minGood Clean Cybersecurity Hygiene: The Top 4 Reasons You Need an Automated SOC in 2022Have you set cybersecurity goals for this year? If not, it’s time to make a plan. Many people hesitate to get started because security...
Katy Munden PennerFeb 12 minPatrol Your Online Boundaries: Perimeter Visibility and OSINT VisibilityDo you know what is traveling in and out of your network? What kinds of information and files are crossing the boundary between internal...
Katy Munden PennerJan 273 minMind the Cybersecurity Gaps: Network Visibility and Host VisibilityYou have identified and documented all your critical data and assets. (Read our last blog for this step.) Now it’s time to find the gaps...
Katy Munden PennerJan 192 minWhat Do You Have to Lose? Well, a Lot.It’s important to understand risk. And in order to understand any organization’s cybersecurity risks, you need to take inventory. If...
Katy Munden PennerDec 21, 20212 min12 Days of Christmas Cyber TipsWe've spent all year telling you that cybersecurity doesn't have to be so hard. The world is always changing, and we're changing with it....
Katy Munden PennerAug 3, 20212 minInterdependence and Cyber ChangeWe know we can always count on cyber change in the world, and that we must depend on each other to mitigate change. This is why...
Katy Munden PennerApr 12, 20212 minAutomated Security Operations Centers: Block Hacks and ThriveAs remote work continues and increases across the globe, the need for cybersecurity innovation is only growing, and we are constantly...