Firmware is the new cybersecurity attack: here’s why

With Russia ratcheting up its cyberattacks against companies in the USA, DHS/CISA has asked enterprise organizations to check and update their firmware. To get ahead of potential challenges, savvy IT leaders are asking when this kind of attack became mainstream,…

Keep Reading
crossed out words reading prevention, detection. The word premonition is not crossed out. Various patterns are behind the text.
Cyber Premonition: The End of the Prevention vs Detection Debate.

The endless cyber debate between prevention and detection may be settled thanks to former NSA Data Scientists. A new method, not yet on the market (but being fast tracked due to new Russian threats), enables security professionals to visualize their…

Keep Reading
How To Get Your CISSP: Part 2

For those new to this series, 3 Tree Tech CTO, Eric Skeens has decided to document every step of the journey to better shed light for IT nerds and executives. For those wondering how to get your CISSP, check out…

Keep Reading
35% of Enterprise Employee Data Is On The DarkWeb.

The dark web is a rich resource for internet scoundrels peddling stolen information, but have you been curious how much of your employee’s data is exposed or how to search the dark web to begin with? You may believe having…

Keep Reading
How To Get Your CISSP

As our own CTO, Eric Skeens goes after his CISSP, he has decided to document every step of the journey to better shed light for IT nerds and executives. For those wondering how to get your CISSP, resources available, and…

Keep Reading
How can 150 Million in DARPA research improve your security posture?

As our team was researching the DOD’s big 700 Million RFP for their 20 Combat centers, we learned the requirement that all security vendors selected must send their logs to a specific artificial intelligence/machine learning (AI/ML) driven NextGen SIEM. Intrigued,…

Keep Reading
Cybersecurity’s Focus On Prevention Is A Vulnerability

Can hacking be stopped? As the conventional cybersecurity industry focuses on prevention, their profits reach into the billions and hacker profits exceed the illegal drug trade. CIO and CTO leaders are conditioned to accept they will be hacked, shelling out…

Keep Reading
hand on keyboard in dark setting
How Hacking Works. And How Software-Defined Perimeter Fights Back.

Hackers rarely take on your firewall directly, dramatically punching a series of keys looking at screens of code in a dark room. It makes for a great movie scene—but the reality isn’t as sexy. I sat down with expert hacker,…

Keep Reading
Who’s holding you hostage: Cybersecurity companies or hackers?

It’s a serious headline. Although most CISOs, CIOs, and CTOs teams have the best intentions taking proactive steps to prevent a data breach and ward off hacking intrusions, many are stunned when they discover their security response retainer didn’t actually…

Keep Reading