Archive

How Ransomware Groups Exploit “Business as Usual” in FinServ

July 3, 2025 Guest Author: Chris Hencinski, Senior Solutions Architect, Expel In the first quarter of 2025, financial services was the most targeted industry.

Setting Boundaries: How to Define and Enforce Third-Party Cyber Risk Tolerance

June 30, 2025 Vendors play a critical role in scaling operations and delivering innovation—but their integration must be balanced with a clear understanding of cyber risk exposure.

The Birth and Death of “LoopyTicket” – Our Story on CVE-2025-33073

June 27, 2025 Sometimes the best discoveries happen when you’re not even looking for them.

Expert Guidance, Real Impact: What the NTAS Advisory Means for Your Organization

June 25, 2025 Heightened tensions in the Middle East are a stark reminder that geopolitical conflict often spills over into cyberspace.

Why IAM Maturity Still Eludes Most Organizations — And What High Performers Are Doing Differently

June 25, 2025 In today’s complex threat landscape, Identity and Access Management (IAM) is more than just a compliance checkbox; it’s a foundational security pillar.

Operationalizing Cyber Risk Tolerance: From Policy to Practice

June 16, 2025 Cybersecurity isn’t just about setting limits—it’s about making sure everyone knows what to do when those limits are tested.

Incident Response: Can Your Organization Survive the Next Cyber Crisis?

June 10, 2025 The stakes for cybersecurity incidents have never been higher. Operational disruption. Brand damage. Financial loss.

Tabletop to Real World: Turning Incident Response Exercises into Operational Readiness

May 30, 2025 Tabletop exercises are just the start Running a tabletop or simulated incident is a critical step in building preparedness.

How Mature Is Your Identity and Access Management Program?

May 29, 2025 Identity-based threats continue to rise in frequency and sophistication.

You’ve Contained the Threat — What Comes Next? From Recovery to Lessons Learned

May 22, 2025 Many organizations prioritize detection, analysis, and containment — but what comes after is where true resilience is built.

Navigating Incident Response Documentation

May 15, 2025 Understanding Plans, Playbooks, and Runbooks When a cybersecurity breach or an unexpected disruption occurs, time is critical.

Bridging the Gap: How a Controls-Focused Cybersecurity Program Aligns SEC Rules with Daily Operations

May 13, 2025 With the U.S.