2 min read
A Different Approach to Cybersecurity
Take a fundamentally different approach to cybersecurity. Be proactive. Gain a new perspective—an unparalleled awareness of your network activity.
Read More2 min read
Take a fundamentally different approach to cybersecurity. Be proactive. Gain a new perspective—an unparalleled awareness of your network activity.
Read More2 min read
Much like the legacy systems that CISA mentioned in their recent advisory, IoT (and medical) devices also lack host-based EDR solutions. Here's a...
2 min read
The Cybersecurity and Infrastructure Security Agency's (CISA) message is clear—while EDR and host-based tools are important, they’re not enough.
2 min read
The rapid advancement of the cybersecurity landscape presents organizations with the challenge of managing numerous security tools and vendors, but...
2 min read
In the race to get systems back online after a ransomware incident, organizations tend to “jump the gun.” But remember, Eradication comes before...
2 min read
Earlier this week, I needed to contact my bank about an error. I tried to get ahold of someone on the bank’s app and website, but they weren't much...
3 min read
Earlier last week, we watched the much-anticipated Solar Eclipse take place. It wasn’t too exciting here in Arizona, but we made our obligatory march...
2 min read
Last spring, Gartner issued eight cybersecurity predictions at their Security and Risk Management Summit. Among the eight, one really caught my eye:...
3 min read
This month, PacketWatch CEO Chuck Matthews explores the parallels between the Wild West's challenges and opportunities and today's Artificial...
2 min read
This month, PacketWatch CEO Chuck Matthews explores how the role of CISO has changed and how they can have better conversations with their CEOs and...