Resources

Resource Types
News

Why Teams Need a Strategy for Responding to AI-Driven Threats – SC Magazine

June 18, 2024 | As AI-driven cyber threats evolve, security teams must adopt advanced strategies to counteract them.

News

Preventing Cyberattacks: The Role of Risk Profiling [Q&A]

June 28, 2024 | Randy Watkins, CTO at Critical Start, discusses the critical importance of cyber risk profiling in preventing

News

Critical Start: Managed Cyber Risk Reduction

July 5, 2024 | Critical Start introduces Quick Start Risk Assessments and expanded framework coverage for Managed Cyber Risk

News

Tips for Handling Cybersecurity Outages

July 19, 2024 | The CrowdStrike outage highlights key strategies for managing disruptions.

News

Ransomware, Junk Bank Accounts: Cyber Threats Proliferate in Vietnam – Dark Reading

April 2, 2024 | Vietnam's rapid economic growth has led to a surge in cybercrime, including ransomware attac

News

Dell Data Breach Impacts 49 Million Customers - CPO Magazine

May 15, 2024 | Dell Technologies reported a data breach affecting 49 million customers, exposing personal information through

News

Why Teams Need a Strategy for Responding to AI-Driven Threats – SC Magazine

June 18, 2024 | As AI-driven cyber threats evolve, security teams must adopt advanced strategies to counteract them.

News

Cybersecurity Burnout: Costing Enterprises More Than Money

June 28, 2024 | Cybersecurity stress is rampant, with burnout costing U.S.

News

Federal Cybersecurity Hiring: What More Needs to Be Done?

July 10, 2024 | The Biden administration launched the National Cyber Workforce and Education Strategy (NCWES) to fill 470,000

News

CrowdStrike vs. Microsoft: Who's at Fault for the IT Outage?

July 19, 2024 | A global IT outage caused by a CrowdStrike update has led to debate over responsibility.

News

Microsoft Copilot for Security: The MSSP Opportunity – MSSP Alert

April 2, 2024 | Microsoft's release of Copilot for Security integrates AI into its security offerings, provi

News

2 D-Link Router Bugs Added to CISA’s Exploited Vulnerabilities Catalog - SC Magazine

May 18, 2024 | CISA has added two end-of-life D-Link routers to its Known Exploited Vulnerabilities catalog, urging immediate