News & Events


If you are an IT, data and security professional that works outside of a security company- this event is for you!

Connect with like-minded people while sampling craft beer and delicious food.

Register today and you will be hand-delivered your cooking kit and beer samples the day of the event. Jonathan Gilman, Executive Chef of Brato, will then lead us through the cooking lesson and beer tasting. We will then enjoy our creations while networking.



The Intricacies of MDR

MDR sounds simple; it is only three letters, so how complicated can it be? The answer to this may surprise you. Managed Detection and Response (MDR) is more than just overseeing what’s happening in your environment.

Read More »

Penetration Testing 101

Penetration testing (or pen testing) is a process by which software is utilized to probe a network and its elements for security risks. The job of security is always to focus on reducing the attack surface. Pen testing is what allows you to do this.

Read More »
Calculate the cost of network security operations for your business

The cost of in-house network security can add up quickly

As you think about securing your business against cyber attacks, keep in mind that you’ll not only need an up-to-date system, but you’ll also need to consider keeping it current.
And the human element can be even trickier. Find out the real cost of creating an in-house security team.

Read More »

Mobile Security Tips for End Users

In a mobile world, it is important to conduct a risk analysis of whether a person may be a target of an attack on their phone. Here are some steps one can take to reduce the exposure to phone-based attacks, depending on the level of risk…

Read More »

Reduce Your Technical Debt

Technical debt reflects the implied cost of addition rework caused by choosing an easy solution now rather than taking the time to properly plan and execute a project.

Read More »
Working Remotely

Preparing for the Unknown Has Become a Reality

Preparing for the Unknown Has Become a Reality Many established companies were used to going into their brick and mortar offices, and then were forced to go remote. How prepared were you for this change? We have come across a couple of scenarios to which you might be able to

Read More »

Cyber Hygiene Checklist

Understanding the very basics of cyber defense will help you better prepare for the security conversations that will inevitably occur within your organization. 

Read More »
Protecting Your IP

12 Ways to Protect Your Intellectual Property Against Cyber Attacks [Part I]

12 Ways to Protect Your Intellectual Property Against Cyber attacks [part I] WRITTEN BY MICHAEL JOSEPH (PRESIDENT & CO-FOUNDER) & MICHAEL FORD (Director of strategic INITIATIVES) It’s 2:00 a.m. Do you know who is accessing your company’s Intellectual Property (IP)? Your company’s IP includes customer and employee information, business plans,

Read More »