Author: Certitude Security

Digital hand reaches out from a compromised laptop.

What is Social Engineering?

Given the financial losses due to the volume of social engineering attacks annually, you should know how useful your security training is at modifying human behavior, which is critical to improving training effectiveness.

American flag waves behind the Statue of Liberty.

Bring Manufacturing Back to America

Bringing research and manufacturing back to the U.S. is important to our economy and national security. Reshoring requires substantial capital and time, so government cooperation with industry is imperative.

Cybersecurity professional conducts a blue team assessment.

What Are Blue Teams and Blue Team Exercises?

Blue teams are responsible for monitoring, detecting, and reacting to security threats. Click here to learn more about blue teams.

Business leader conducts a red team exercise.

What Are Red Teams and Why Conduct Exercises?

Valuable and objective insights about the existence of vulnerabilities, efficacy of defenses, and mitigating controls for the U.S. manufacturing industry. Click here to learn more about Red teams.

Supply chain professional creates a flow map.

How Third-Party Risks Impact the Supply Chain

A systematic approach to third-party risk management is needed for more effective supply chain management. Click here to learn more about third-party risk.