Tony Pugielli

4 min read

Cybersecurity Risks in the Software Supply Chain

The supply chain has experienced many problems over the last several years, and now the software supply chain is facing problems of its own as bad actors try to access vulnerabilities.

Read More

4 min read

Cybersecurity Failure Forces University Closure. What Went Wrong?

A recent ransomware attack forced a college into closure after 157 years. What can we learn from this case? And why are ransomware attacks against...

Read More

3 min read

What Can the Ukraine Conflict Teach Us About Modern Cybersecurity?

While the war in Ukraine is thousands of miles away, domestic cybersecurity professionals must pay close attention to stay ahead of emerging threat...

Read More

3 min read

The Dangers of Killware

Killware is the latest — and perhaps scariest — cyber threat making headlines. Learn what killware is and why everyone should be aware of the dangers...

Read More

4 min read

What is log4j: Untangling the Biggest Cybersecurity Vulnerability in History

Find out why security experts are calling the newly-discovered log4j vulnerability “apocalyptic” — and discover what the vulnerability means for you.

Read More

3 min read

Everything You Need to Know About Penetration Testing

For organizations working to protect themselves from cybersecurity threats, looking at their IT environment through the eyes of a hacker can be the...

Read More

3 min read

Dissecting a Phishing Attack

Phishing attacks are on the rise in the era of remote work, and today’s businesses need to take the appropriate steps to protect themselves from...

Read More

3 min read

What Is a Network Security Assessment (and Why Do You Need One)?

A network security assessment helps you identify vulnerabilities in your security posture so you can better resist an attack.

Read More

3 min read

How Tensions in the Middle East Call for Increased Cybersecurity

State-sponsored cyber attacks are no longer limited to military and defense organizations. Businesses across industries are potential targets, making...

Read More

3 min read

The Commonly Exploited Applications Your Enterprise Is Already Using

When it comes to applications in the workplace, the most ubiquitous might also be the most commonly exploited. The explosion of IoT connected devices...

Read More

3 min read

What is SQL Injection and How Can It Be Prevented?

SQL injection attacks are some of the oldest and simplest hacks out there, yet they still pose serious threats to enterprise networks. Here’s how...

Read More

3 min read

The Baltimore Ransomware Attack: What You Should Know About Threat Intelligence

As ransomware attacks continue to strike cities and businesses, enterprises must leverage threat intelligence to strengthen their defenses. On May...

Read More

3 min read

Is AIOps the Real Deal?

AIOps is saving enterprises operational costs and labor, but most IT teams are not ready to deploy and manage it. Artificial Intelligence Operations...

Read More

3 min read

What Is Public Key Infrastructure and How Could It Help Secure the IoT?

IT professionals looking to secure their IoT devices are turning to public key infrastructure. What is PKI, and can it help secure your IoT network?...

Read More

3 min read

How to Make AIOps Work for Enterprise IT Teams

When it comes to implementing AIOps tools successfully, the key is using quality data for specific objectives. Traditional network monitoring tools...

Read More

3 min read

How to Integrate Zero Trust into Your Cybersecurity Strategy Without the Productivity Loss

Zero Trust is a security paradigm that challenges enterprises to verify all sources of network traffic. Can this stringent approach be implemented...

Read More

2 min read

Best Practices for Security Incident Reporting in Healthcare

Streamlined incident reporting could help the healthcare industry improve its abysmal external security posture. A recent cross-industry study from...

Read More

2 min read

What Is an “Active Adversary” Approach, and Is It the Future of Cybersecurity?

Passive, reactive, and automated, the conventional whack-a-mole approach to commercial cybersecurity has failed. Instead, we must proactively address...

Read More

2 min read

Defending the Defense Department: How the DoD Is Beefing Up Its Cybersecurity Measures

The Department of Defense recently announced that it will soon start to hold non-government contractors to a higher standard of cybersecurity than...

Read More

2 min read

3 Common Problems with Enterprise WiFi Networks

Designing, maintaining, and securing a large WiFi network is remarkably difficult, which is why many enterprises struggle to provide their employees...

Read More

3 min read

How to Make Sure New Cybersecurity Processes Take Hold in the Office

Enterprise IT teams are well aware of what it takes to keep their networks safe — it’s getting the rest of the employees to play their part that’s...

Read More

2 min read

Getting Ready for a Cybersecurity Audit? Here’s How You Can Prepare.

A third-party audit is a great way to improve network security, but enterprise IT teams must recognize that they have a part to play in the process....

Read More

3 min read

How Companies Can Protect Themselves Against KRACK Attacks

Key Reinstallation Attacks are a threat to nearly every wireless network, but there’s a set of straightforward steps any enterprise can take to...

Read More