Katy Munden HaysMar 3, 20222 minCybersecurity Strategy for Brilliant Leaders & ExecutivesIs anyone else tired of being called a Dummy when you get one of those books? You know, the kind that take technical terms and write them...
Katy Munden HaysFeb 21, 20223 minGood Clean Cybersecurity Hygiene: The Top 4 Reasons You Need an Automated SOC in 2022Have you set cybersecurity goals for this year? If not, it’s time to make a plan. Many people hesitate to get started because security...
Katy Munden HaysFeb 1, 20222 minPatrol Your Online Boundaries: Perimeter Visibility and OSINT VisibilityDo you know what is traveling in and out of your network? What kinds of information and files are crossing the boundary between internal...
Katy Munden HaysJan 27, 20223 minMind the Cybersecurity Gaps: Network Visibility and Host VisibilityYou have identified and documented all your critical data and assets. (Read our last blog for this step.) Now it’s time to find the gaps...