Protecting Your Inbox from Phishing Impersonation
Advanced, targeted phishing scams that impersonate well-known brands or VIPs within an organization are a big problem for security teams…
Cloud Security Considerations: Authentication / Access Control and Account Privileges
Blog by Sr. Risk and Compliance Consultant Tim Paschal and Principal Risk and Compliance Consultant Anton Abaya.
Journey to the Center of the SOC
It’s easy to feel overwhelmed as part of a security team. Every day, analysts have to stare down the perils…
Case Study: Real-World Breach Response
After a large e-commerce service provider found malware in an email sent to customers, their IT team dove deep into…
Making the Case for Targeted Assessments
Article by Josh Berry, Principal Risk and Compliance Consultant.
From Beginning to Endpoint | Neutralizing Threats with EDR
Ransomware attacks increased significantly in 2020 as the world grappled with the realities of COVID-19. While many enterprises were prepared…
Phishing in a Pandemic: How to Combat Social Engineering Attacks
Evolving working environments and increased reliance on personal device usage has opened the door to increased cyber threat activity. Read…
Introducing Plug and Play Business Application Connectors for Webex Contact Center
Blog written by Chris Featherstone, courtesy of Cisco.
Announcing the New Cognitive and Collaborative Contact Center
Blog written by Vasili Triant, courtesy of Cisco.
Behind the scenes at Arctic Wolf with Sam McLane, CTO
Managed Detection and Response (MDR) providers offer a wide range of services. Some may be right for your business, but…
Healthcare Enterprise Improves Patient Experience with Cloud Contact Center
Case Study Summary Large healthcare enterprises are looking for ways to improve the patient experience while maintaining budget predictability amid…
ASI in 5: Multifunction Printer Attack
In this episode of ASI in 5, Sohil speaks with Senior Risk & Compliance Consultant Tim Paschal. Tim demonstrates how…