Search
Close this search box.
Latest & Greatest Post

Debunking the Myth: Common Misconceptions About Incident Response and Cybersecurity

Read More
Avatar photo
webops
Most Recent
Search

Airiam Acquires Vantage Point Solutions Group, Expanding its Footprint in SME Cybersecurity and IT Management

Airiam Acquires Vantage Point Solutions Group Airiam, a managed IT and Digital Transformation company with a strong focus on cybersecurity, today announced its acquisition of Vantage Point Solutions Group, a leading provider of managed IT services (MSP
Vivian Lee
>>Read More

Airiam and Cybereason Partnership

Airiam and Cybereason Partner to Offer Stronger Incident Response and Enhanced Cybersecurity Airiam, a managed IT and Digital Transformation company with a strong focus on cybersecurity, today announced a partnership with Cybereason that will enhance p
Avatar photo
Bill Bowman
>>Read More

FTC Compliance: The Gramm-Leach-Bliley Revision

Amended Safeguards Rule from FTC On December 9th, 2021, the Federal Trade Commission (FTC) amended the Safeguards Rule, the 1999 Gramm-Leach-Bliley Act, to put more meat on the bones of the previous rule. In this revision, the FTC has made the Safeguar
Avatar photo
Art Ocain
>>Read More

Internal Penetration Testing and Small Businesses

Internal Penetration Testing What is Internal Penetration Testing? You may be thinking, “What even is an internal penetration test?” There is just something wrong about the phrase when you say it. The way it rolls off the tongue is just odd. Internal p
Avatar photo
Andy Gritzer
>>Read More

Tech Scammers and How to Spot Them

How to Spot Tech Scammers   Tech Scammers in the Wild Tech scammers are sneaky and aggressive. You are browsing the internet when all of a sudden… “WARNING: YOUR COMPUTER HAS BEEN INFECTED WITH THE ZEUS VIRUS” The browser you are using is locked
Avatar photo
Andy Gritzer
>>Read More

XDR – Advantages From a Wider View

Endpoint Protection Isn’t Enough There are hundreds of great security products on the market, each filling specific needs and having pros and cons. Endpoint detection and response (EDR) is no exception. EDR finds and kills the threat on the endpoint, y
Avatar photo
Art Ocain
>>Read More

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.