Category: Analysis and Assessments

Cybersecurity expert hunts for cyber threats hidden in private networks.

What is Threat Hunting in Cyber Security?

Antivirus software and firewalls do not protect your systems 100%. Actively searching for advanced persistent threats shines a light on criminals lurking in the darkness. Continue reading.

Business executive develops a strategic business plan.

How Can Insights From Inspectionem℠ Help Us?

A lack of accountability and care is causing problems for businesses. Here’s how to diminish risk and prevent disruptions, waste, and fraud.

seal of the U.S. department of the treasury on building exterior

Advisory on Facilitating Ransomware Payments

Facilitating a ransomware payment enables criminals to profit from their illicit activities and could violate OFAC regulations.

Business leader takes charge of cyber security.

The Importance Of Cyber Security In Business

Responsibilities have moved to the board room because data breach factors that impact your bottom line are not limited to revenue loss, damage to reputation, or loss of Intellectual Property.

Digital hand reaches out from a compromised laptop.

What is Social Engineering?

Given the financial losses due to the volume of social engineering attacks annually, you should know how useful your security training is and the key to modifying human behavior and critical to improving training effectiveness.

Cybersecurity professional conducts a blue team assessment.

What Are Blue Teams and Blue Team Exercises?

Blue teams are responsible for monitoring, detecting, and reacting to security threats. Click here to learn more about blue teams.

Business leader conducts a red team exercise.

What Are Red Teams and Why Conduct Exercises?

Valuable and objective insights about the existence of vulnerabilities, efficacy of defenses, and mitigating controls for the U.S. manufacturing industry. Click here to learn more about Red teams.