HYAS Protect and ConnectWise: Together at Last
At HYAS, our mission has always been to empower our clients with cutting-edge cybersecurity...
HYAS Achieves SOC 2 Type II Certification
As the CEO of HYAS Infosec, I am thrilled to share a significant milestone in our commitment to...
A Gap in the Armor: What Was Missing from Black Hat 2024
Along with 30,000+ of my closest friends, HYAS participated in both the Black Hat 2024 cyber...
Partnering With the National Child Protection Task Force
Empowering the Fight Against Child Exploitation As the CEO of HYAS, I am both honored and...
Fail Open or Fail Closed?
Unless you’ve been hiding under a rock, by now you’ve seen the news and perhaps even been impacted...
Patching Is Not a Strategy
It’s 2024 and if you didn’t know or realize it, your cybersecurity strategy cannot depend and rely...
The Secret Ingredient to Preempt Cyberattacks: Digital Exhaust
Understanding whether a given communication steam is normal, expected, or anomalous and...
Implementing Zero Trust: Beyond Internal Network Models
With 2024 being the year that people and organizations are realizing that they will never be able...
Strengthening Cyber Resilience: A Milestone Partnership
As the CEO of HYAS, I am thrilled to announce a pivotal partnership with ZainTECH, a trailblazer in...
Proactive Intelligence: A Paradigm Shift In Cyber Defense
Traditionally, cybersecurity has been a reactive game: We respond to cyber threats as they arise,...
Why Cybersecurity Must Include Protective DNS
The Domain Name System (DNS) isn’t just the phonebook of the internet. It’s also the primary way...
What is Proactive Threat Intelligence and Why Should I Care?
Lots of people talk about the value of threat intelligence for an organization trying to defend...