Implementing Zero Trust: Beyond Internal Network Models
With 2024 being the year that people and organizations are realizing that they will never be able...
Strengthening Cyber Resilience: A Milestone Partnership
As the CEO of HYAS, I am thrilled to announce a pivotal partnership with ZainTECH, a trailblazer in...
Proactive Intelligence: A Paradigm Shift In Cyber Defense
Traditionally, cybersecurity has been a reactive game: We respond to cyber threats as they arise,...
Why Cybersecurity Must Include Protective DNS
The Domain Name System (DNS) isn’t just the phonebook of the internet. It’s also the primary way...
What is Proactive Threat Intelligence and Why Should I Care?
Lots of people talk about the value of threat intelligence for an organization trying to defend...
Using Proactive Intelligence Against Adversary Infrastructure
Organizations cannot and will never keep bad actors from breaching their perimeter: They’ll always...
A Recap of Cybersecurity in 2023 and What’s Ahead for 2024
With high-profile breaches in the news across the world and increasingly sophisticated threats,...
What Human Anatomy Can Teach Us About Cybersecurity
If you know me, you know that I love analogies. I find that they not only help people understand...
What Is Adversary Infrastructure?
Chasing Command-and-Control When companies and organizations started initially trying to determine...
10 Cybersecurity Trends That Emerged in 2023
Our digital world never stands still. How we do business and interact with each other is evolving...
But It Runs Really Fast
My uncle ran an advertising agency a long time ago, but I still remember one of his impactful ads....
Elevate Your Threat Hunting with JARM
The Evolving Cyber Threat Landscape We live in a world today where nefarious actors are...