Cybersecurity Blog

Articles for Cybersecurity Leaders

Check out our articles below about staying on top of the latest in security research, vulnerabilities, threats, and computer attacks.

Cybersecurity Blog Articles
What You Should Know About Log4J2 [Updated]

What You Should Know About Log4J2 [Updated]

Articles

2 min

Zero Day Notice: Veeam Backup & Replication Vulnerabilities

Zero Day Notice: Veeam Backup & Replication Vulnerabilities

Articles

2 min

Organizations Need Both Cyber Insurance and a Strong Cybersecurity Program

Organizations Need Both Cyber Insurance and a Strong Cybersecurity Program

Articles

4 min

CyberMaxx featured in G2’s Winter 2023 Report for MDR, SIEM and System Security Categories

CyberMaxx featured in G2’s Winter 2023 Report for MDR, SIEM and System Security Categories

Articles

2 min

Continuous Cyber Exposure Management vs Vulnerability Risk Management = The Same?

Continuous Cyber Exposure Management vs Vulnerability Risk Management = The Same?

Articles

3 min

Attack Vectors and Defense Strategies Against Them

Attack Vectors and Defense Strategies Against Them

Articles

4 min

What are the differences between a SOC, vSOC, and mSOC?

What are the differences between a SOC, vSOC, and mSOC?

Articles

7 min

EDR, NDR, XDR And MDR: What’s Right for Your Organization

EDR, NDR, XDR And MDR: What’s Right for Your Organization

Articles

6 min

Communication: How live-simulation training helps cyber analysts speed up soft skills

Communication: How live-simulation training helps cyber analysts speed up soft skills

Articles

3 min

FTC Releases Guidance on New Safeguards Rules…Why You Should Care. Ready?

FTC Releases Guidance on New Safeguards Rules…Why You Should Care. Ready?

Articles

5 min

Threat Actors, Attack Vectors and Bears, oh my!

Threat Actors, Attack Vectors and Bears, oh my!

Articles

7 min

MAXX Response – Effective DFIR Services [VIDEO]

MAXX Response – Effective DFIR Services [VIDEO]

Articles

2 min