The Value of Unique Data for Threat Intel
Let’s face it – researching an existing threat or fraud case is not an easy or straightforward...
It’s Award Season, Again
As CEO, I couldn’t be more proud of the entire HYAS team. Because of their hard work, and...
HYAS Protect and ConnectWise: Together at Last
At HYAS, our mission has always been to empower our clients with cutting-edge cybersecurity...
HYAS Achieves SOC 2 Type II Certification
As the CEO of HYAS Infosec, I am thrilled to share a significant milestone in our commitment to...
A Gap in the Armor: What Was Missing from Black Hat 2024
Along with 30,000+ of my closest friends, HYAS participated in both the Black Hat 2024 cyber...
Partnering With the National Child Protection Task Force
Empowering the Fight Against Child Exploitation As the CEO of HYAS, I am both honored and...
Fail Open or Fail Closed?
Unless you’ve been hiding under a rock, by now you’ve seen the news and perhaps even been impacted...
Patching Is Not a Strategy
It’s 2024 and if you didn’t know or realize it, your cybersecurity strategy cannot depend and rely...
The Secret Ingredient to Preempt Cyberattacks: Digital Exhaust
Understanding whether a given communication steam is normal, expected, or anomalous and...
Implementing Zero Trust: Beyond Internal Network Models
With 2024 being the year that people and organizations are realizing that they will never be able...
Strengthening Cyber Resilience: A Milestone Partnership
As the CEO of HYAS, I am thrilled to announce a pivotal partnership with ZainTECH, a trailblazer in...
Proactive Intelligence: A Paradigm Shift In Cyber Defense
Traditionally, cybersecurity has been a reactive game: We respond to cyber threats as they arise,...