Glen Willis

Black and white photo of a lone man standing still among blurred crowds in a public space, symbolizing identity vulnerability and unnoticed threats.

Hybrid Identity at Risk: Microsoft Exchange Vulnerability Disclosed at Black Hat 2025

A newly disclosed flaw in on‑prem Microsoft Exchange environments could allow attackers to compromise identity systems and move laterally across environments, without detection. Vulnerability Overview At Black Hat USA 2025, security researcher Dirk‑jan Mollema (Outsider Security) revealed a high‑severity vulnerability affecting hybrid Microsoft Exchange deployments, where on‑prem Exchange connects to Microsoft 365 via Entra ID.The flaw enables attackers […]

Hybrid Identity at Risk: Microsoft Exchange Vulnerability Disclosed at Black Hat 2025 Read More »

CVE and MITRE Funding Uncertainty

A Wake-Up Call for Cyber Resilience: What CISA’s CVE Renewal Teaches Us About the Future of Vulnerability and Threat Intelligence

The cybersecurity landscape faces an important shift. The U.S. government’s recent decision to renew MITRE’s contract to operate the Common Vulnerabilities and Exposures database (CVE database) reassured many across the cybersecurity community. Still, the uncertainty leading up to the renewal exposed an operational gap: over-reliance on a single, centralized system for vulnerability coordination. That short-term

A Wake-Up Call for Cyber Resilience: What CISA’s CVE Renewal Teaches Us About the Future of Vulnerability and Threat Intelligence Read More »

Email app symbol on a phone or computer screen.

Outsmarting the hackers behind today’s Business Email Compromise attacks

Business Email Compromise (BEC) campaigns have become increasingly prevalent and costly, with the FBI estimating global annual losses in the billions of dollars. This sophisticated form of cybercrime targets organizations by exploiting email systems to deceive employees and manipulate them into performing unauthorized transactions or divulging sensitive information.   Understanding the mechanisms of BEC and implementing

Outsmarting the hackers behind today’s Business Email Compromise attacks Read More »

5 sure-fire strategies for achieving a reasonable cybersecurity baseline

Strategies for achieving a cybersecurity baseline

The cybersecurity industry offers an abundance of high-quality, constructive guidance for organizations. Although this is something to be celebrated, it can also be overwhelming for business and technology leaders who are grappling with the following questions: How to determine if the organization’s current cybersecurity posture is good enough? How to establish the right priorities within

Strategies for achieving a cybersecurity baseline Read More »

Your future is secured when your business can use, maintain, and improve its technology

Request a free consultation