People fighting over phone with sad face
35% of Enterprise Employee Data Is On The DarkWeb.

The dark web is a rich resource for internet scoundrels peddling stolen information, but have you been curious how much of your employee’s data is exposed or how to search the dark web to begin with? You may believe having…

More Details
Over the Horizon
How can 150 Million in DARPA research improve your security posture?

As our team was researching the DOD’s big 700 Million RFP for their 20 Combat centers, we learned the requirement that all security vendors selected must send their logs to a specific artificial intelligence/machine learning (AI/ML) driven NextGen SIEM. Intrigued,…

More Details
man holding computer that reads "can hacking be stopped?"
Cybersecurity’s Focus On Prevention Is A Vulnerability

Can hacking be stopped? As the conventional cybersecurity industry focuses on prevention, their profits reach into the billions and hacker profits exceed the illegal drug trade. CIO and CTO leaders are conditioned to accept they will be hacked, shelling out…

More Details
iphone and rotary phone handle
Tech Silos Hurt Service
Winning customer experience is how you make yourself disruption proof, but staff training isn’t good enough as large entities use tech to scale. Your best intentions go out the window when your siloed tech kills customer service. If you change...
More Details
Credit cards
The End Of Granite Grid’s Death Grip On Malls
Granite Grid problems are well known, as is the technology's chokehold on most malls. That grip, however, may finally be loosening as new tech gives mall retailers breathing room. Granite Grid Problems By becoming an ILEC in around 300 largest...
More Details
hand on keyboard in dark setting
How Hacking Works. And How Software-Defined Perimeter Fights Back.

Hackers rarely take on your firewall directly, dramatically punching a series of keys looking at screens of code in a dark room. It makes for a great movie scene—but the reality isn’t as sexy. I sat down with expert hacker,…

More Details
hacker using keyboard
Who’s holding you hostage: Cybersecurity companies or hackers?

It’s a serious headline. Although most CIOs and CTOs teams have the best intentions taking proactive steps to prevent a data breach and ward off hacking intrusions, many are stunned when they discover their security response retainer didn’t actually protect…

More Details