HYAS Blog | Blog Listing Page
Stay ahead of cyber threats with HYAS! Explore our cybersecurity blog for the latest insights, analysis, expert tips, and industry news.
The Value of Unique Data for Threat Intel
Let’s face it – researching an existing threat or fraud case is not an easy or straightforward...
Beyond Filters: The Advantages of Protective DNS
Protective DNS (PDNS) uses the Domain Name System (DNS) to provide an additional layer of...
Achieving Cyber Resiliency With Protective DNS
DNS (Domain Name System) is the basis for how devices find and communicate with each other over...
SLED’s Secret Weapon: Deploying Protective DNS
State, local and education (SLED) organizations face many of the same cyberthreats as for-profit...
It’s Award Season, Again
As CEO, I couldn’t be more proud of the entire HYAS team. Because of their hard work, and...
DNS Security: A Key Component of Network Resiliency
DNS security is critical to network resiliency, particularly in blocking command and control...
HYAS Protect and ConnectWise: Together at Last
At HYAS, our mission has always been to empower our clients with cutting-edge cybersecurity...
How One Canadian Credit Union Uses HYAS To Combat Fraud
One HYAS client, a leading Canadian credit union, is a constant target of cybercrime. However,...
How One Consultancy Behemoth Uses HYAS for Unrivaled Cybersecurity
One financial services and consulting behemoth designed its cybersecurity stack with an...
The Malware Chronicles: Urelas, Sality, LockBit and StealC Examined
Threat Intelligence Report Date: September 4, 2024 Prepared by: David Brunsdon, Threat Intelligence...
Special Bulletin: US Election Phishing Alert
Threat Intelligence Report Date: August 28, 2024 Prepared by: David Brunsdon, Threat Intelligence -...
HYAS Achieves SOC 2 Type II Certification
As the CEO of HYAS Infosec, I am thrilled to share a significant milestone in our commitment to...