Lessons Learned from the CrowdStrike Tech Outage
by Jesse Roberts on July 22, 2024 at 3:00 PM
The recent global outage caused by CrowdStrike's faulty update has highlighted crucial lessons for organizations worldwide. By examining the factors that led to this disruption and understanding how to mitigate similar risks, organizations can enhance their resilience and ensure conti …
Leave the World Behind – Could the Cyberattack Blackout Really Happen?
by Nicholas Foisy on December 13, 2023 at 4:31 PM
Spoiler Alert: This article reveals key aspects of "Leave the World Behind." This captivating movie engages viewers with a narrative that seamlessly merges the realms of fiction and plausible real-world events. Its portrayal of a devastating cyberattack resulting in a countrywide powe …
Flight Troubles & Business Continuity Planning
by Jake Dwares on January 11, 2023 at 4:15 PM
This morning, the Federal Aviation Administration’s (FAA) system for alerting pilots and airports of real-time hazards, called NOTAM (Notice to Air Missions), went offline around 3:28AM EST. While flights have slowly resumed to normalcy, this recent event is a further example of a bre …
Reflecting on the AWS Outage and Cloud Disruption Risks
by Jake Dwares on December 9, 2021 at 4:38 PM
Cloud computing and cloud hosting popularity has skyrocketed over the past several years, and the trend is likely only to continue to grow. It began as a means to a more efficient way to host data in the cloud rather than on-premises, and COVID-19 amplified the growth and adoption of …
Ransomware Disrupting Your Beer Supply
by Peter Fellini on July 16, 2021 at 1:00 PM
When brainstorming blog topics, it often helps to find intersections between your profession and your personal interests. In this case, that intersection is cybersecurity and brewing beer, respectively. But what could beer possibly have to do with cybersecurity?
Traditional Antivirus vs. Endpoint Detection Response (EDR)
by Danielle Corsa on May 12, 2021 at 1:00 PM
While there are many antivirus solutions available on the market, we know that not every solution can detect and remove every type of malware. Therefore incident response tools are important to keep in your arsenal.