by Jordan Hickam | Apr 26, 2024 | Blog Posts
Technology moves and evolves swiftly, with change being the only true constant. Year after year, one undeniable trend remains consistent for tech industry leaders: an escalation of cyberattacks and breach attempts. The need for robust cyber risk management only...
by Jordan Hickam | Apr 16, 2024 | Blog Posts
A technology known as deepfaking, in which images, audio, and video realistically imitate real people, is increasingly used for social engineering phishing attacks. The emerging cybersecurity threat precipitated a 43-page Department of Homeland Security educational...
by Jordan Hickam | Mar 4, 2024 | Blog Posts
The latest and greatest high-tech infrastructure and tools can help fortify any workflow or supply chain, but cybersecurity is only as strong as its weakest link. More often than not, that weakest link will manifest as errors or actions performed by personnel as...
by Jordan Hickam | Feb 26, 2024 | Blog Posts
Cyber threats loom, and organizations are in a relentless battle to protect digital assets and sensitive information. Meanwhile, the entire cybersecurity industry continues to feel the crunch of an ongoing issue: a growing shortage of skilled personnel. Finding,...
by Jordan Hickam | Feb 13, 2024 | Blog Posts
While it’s a relative newcomer to the world of cloud risk management, StateRAMP has emerged as a powerful resource and standardized approach to security and risk assessment management. Public agency RFPs may require service providers to obtain StateRAMP certification...