Chad Calease
Yesterday, @SentinelOne published their findings on "XcodeSpy", a new form of malware targeting macOS.
Ever wonder if a link in an email is legitimate?It’s not getting any easier to tell when a website, link, or attachment is ‘phishy’ - meaning if it’s legit or something we...
Back in February of 2009, the Obama Administration put the HITECH act into law, primarily as a means to update HIPAA which was started in 1996, and needed to be updated. But...
Cybersecurity is top of mind for every organization, including those who are Mac-based. Learn how you can reduce security risks on Macs by managing the two different types of...
It's time for a new round of novel malware to match the shiny, new M1 architecture, so sing along with me, "Weeeeeeee!!!"
Phishing sucks. It’s a persistent nuisance at best and potentially catastrophic at worst. While technology isn’t able to catch all of it 100% of the time, DMARC can help to...
AI is now part of everyday business. It powers customer support, speeds up decision-making, and changes how teams work. But without clear rules, it...
With technology advancing so fast, it’s no surprise that nearly 90% of businesses report that legacy technologies are holding them back. Numerous...
Data is the lifeblood of business. Structured or unstructured, qualitative or quantitative, a business’s data comprises one of its most valuable...