The Rise of Typhoon Cyber Groups
Threats to Critical Infrastructure and the Role of Infrastructure Intelligence While cybersecurity...
Ransomware and the Impact on Human Lives
In past years, we've all talked about the looming threat of ransomware and cyberattacks, not just...
The Value of Unique Data for Threat Intel
Let’s face it – researching an existing threat or fraud case is not an easy or straightforward...
It’s Award Season, Again
As CEO, I couldn’t be more proud of the entire HYAS team. Because of their hard work, and...
HYAS Protect and ConnectWise: Together at Last
At HYAS, our mission has always been to empower our clients with cutting-edge cybersecurity...
HYAS Achieves SOC 2 Type II Certification
As the CEO of HYAS Infosec, I am thrilled to share a significant milestone in our commitment to...
A Gap in the Armor: What Was Missing from Black Hat 2024
Along with 30,000+ of my closest friends, HYAS participated in both the Black Hat 2024 cyber...
Partnering With the National Child Protection Task Force
Empowering the Fight Against Child Exploitation As the CEO of HYAS, I am both honored and...
Fail Open or Fail Closed?
Unless you’ve been hiding under a rock, by now you’ve seen the news and perhaps even been impacted...
Patching Is Not a Strategy
It’s 2024 and if you didn’t know or realize it, your cybersecurity strategy cannot depend and rely...
The Secret Ingredient to Preempt Cyberattacks: Digital Exhaust
Understanding whether a given communication steam is normal, expected, or anomalous and...