Skip to the main content.

PacketWatch Blog

Read our latest blogs from PacketWatch and our trusted partners.

Sign up today

Be in the know. Stay ahead of the curve.

Register for our weekly newsletter with fresh content delivered right to your inbox.

vendor relationship cybersecurity

2 min read

Partners are More than Vendors

The rapid advancement of the cybersecurity landscape presents organizations with the challenge of managing numerous security tools and vendors, but what they really need is a partner. To navigate this environment effectively, businesses must move...

Read More
eradication recovery incident response framework cybersecurity

2 min read

Just Remember, "E" Comes Before "R"

In the race to get systems back online after a ransomware incident, organizations tend to “jump the gun.” But remember, Eradication comes before...

Read More
password manager cybersecurity

1 min read

5 Reasons Why You Need a Password Manager

A majority of all security incidents that PacketWatch responds to confirm that hackers attempt to pull usernames and passwords from browsers like...

Read More
ai compliance cybersecurity NIST

3 min read

Identifying and Managing AI Risks in Your Environment

AI seems to be the next big thing in computing and technology, but few people understand what AI tools like ChatGPT, CoPilot, and Gemini really are,...

Read More
Morris II AI Worm Cybersecurity concerns

2 min read

From Morris to Morris II: AI Models are Vulnerable to Worms, Too

Earlier this week, I needed to contact my bank about an error. I tried to get ahold of someone on the bank’s app and website, but they weren't much...

Read More
BCDR Cybersecurity Planning

3 min read

Disaster Recovery: Beyond Just Backups

When discussing disaster recovery (DR) within organizations, the most common sentiment I hear is “we back up all of our stuff, so we’re good.”

Read More
cybersecurity CIRCIA CISA covered entities

3 min read

The Eclipse has Nothing on This...

Earlier last week, we watched the much-anticipated Solar Eclipse take place. It wasn’t too exciting here in Arizona, but we made our obligatory march...

Read More
Shadow AI usage in the office

2 min read

The Rise of Shadow AI

Last spring, Gartner issued eight cybersecurity predictions at their Security and Risk Management Summit. Among the eight, one really caught my eye:...

Read More
vendor management supply chain attack cybersecurity

3 min read

The Weak Link in Your Network Might Lie with Your Vendors

Optimizing operational performance is a key ingredient for organizations to produce quality products and/or deliver excellent service and generate...

Read More
cybersecurity framework examples, guide

4 min read

How to Develop the Right Security Program for Your Organization

Creating a Security Program is one of the best ways an organization can lower the risk and impact of a cybersecurity incident.

Read More