Cybersecurity Blog

Articles for Cybersecurity Leaders

Cybersecurity Blog Articles
What You Should Know About Log4J2 [Updated]

What You Should Know About Log4J2 [Updated]

Articles

2 min read

Zero Day Notice: Veeam Backup & Replication Vulnerabilities

Zero Day Notice: Veeam Backup & Replication Vulnerabilities

Articles

2 min read

Organizations Need Both Cyber Insurance and a Strong Cybersecurity Program

Organizations Need Both Cyber Insurance and a Strong Cybersecurity Program

Articles

4 min read

CyberMaxx featured in G2’s Winter 2023 Report for MDR, SIEM and System Security Categories

CyberMaxx featured in G2’s Winter 2023 Report for MDR, SIEM and System Security Categories

Articles

2 min read

Continuous Cyber Exposure Management vs Vulnerability Risk Management = The Same?

Continuous Cyber Exposure Management vs Vulnerability Risk Management = The Same?

Articles

3 min read

Attack Vectors and Defense Strategies Against Them

Attack Vectors and Defense Strategies Against Them

Articles

4 min read

EDR, NDR, XDR And MDR: What’s Right for Your Organization

EDR, NDR, XDR And MDR: What’s Right for Your Organization

Articles

6 min read

Communication: How live-simulation training helps cyber analysts speed up soft skills

Communication: How live-simulation training helps cyber analysts speed up soft skills

Articles

3 min read

FTC Releases Guidance on New Safeguards Rules…Why You Should Care. Ready?

FTC Releases Guidance on New Safeguards Rules…Why You Should Care. Ready?

Articles

5 min read

Threat Actors, Attack Vectors and Bears, oh my!

Threat Actors, Attack Vectors and Bears, oh my!

Articles

7 min read

MAXX Response – Effective DFIR Services [VIDEO]

MAXX Response – Effective DFIR Services [VIDEO]

Articles

2 min read

Reducing the Cost of a Data Breach: Part 2 – Mitigating Costs

Reducing the Cost of a Data Breach: Part 2 – Mitigating Costs

Articles

4 min read