Glen Willis

Black and white photo of a lone man standing still among blurred crowds in a public space, symbolizing identity vulnerability and unnoticed threats.

Hybrid Identity at Risk: Microsoft Exchange Vulnerability Disclosed at Black Hat 2025

A newly disclosed flaw in on‑prem Microsoft Exchange environments could allow attackers to compromise identity systems and move laterally across environments, without detection. Vulnerability Overview At Black Hat USA 2025, security researcher Dirk‑jan Mollema (Outsider Security) revealed a high‑severity vulnerability affecting hybrid Microsoft Exchange deployments, where on‑prem Exchange connects to Microsoft 365 via Entra ID.The flaw enables attackers […]

Hybrid Identity at Risk: Microsoft Exchange Vulnerability Disclosed at Black Hat 2025 Read More »

CVE and MITRE Funding Uncertainty

A Wake-Up Call for Cyber Resilience: What CISA’s CVE Renewal Teaches Us About the Future of Vulnerability and Threat Intelligence

The cybersecurity landscape faces an important shift. The U.S. government’s recent decision to renew MITRE’s contract to operate the Common Vulnerabilities and Exposures database (CVE database) reassured many across the cybersecurity community. Still, the uncertainty leading up to the renewal exposed an operational gap: over-reliance on a single, centralized system for vulnerability coordination. That short-term

A Wake-Up Call for Cyber Resilience: What CISA’s CVE Renewal Teaches Us About the Future of Vulnerability and Threat Intelligence Read More »

ODR-Risk Mitigation

How ODR Enables Agile Risk Mitigation in Enterprise Security

Cyber threats are escalating at a fast pace, with the average cost of a data breach reaching $4.88 million last year. One recent industry report showed that ransomware attacks increased substantially this year. Attackers actively scan for weaknesses in software, infrastructure, and human behavior. When they spot a flaw, they move quickly to exploit it.

How ODR Enables Agile Risk Mitigation in Enterprise Security Read More »

Why-SOC-2-Compliance-is-Essential-for-Long-Term-Business-Success

Why SOC 2 Compliance is Essential for Long-Term Business Success

Imagine this: A potential client wants proof that your company manages their data securely. Without it, the deal may stall or slip to a competitor. That is where SOC 2 compliance comes in. It is not only about passing an audit—SOC 2 builds trust, protects long term relationships, and prevents security issues that can upset

Why SOC 2 Compliance is Essential for Long-Term Business Success Read More »

Employee Empowerment: The Foundation of a Strong Business

Companies talk about building strategies or upgrading security all the time. However, even well-meaning companies that plan for new initiatives or refine their security measures sometimes do not include their people from the get-go. A well thought out plan or advanced tech only succeeds if your team has true ownership and adds their spark. When

Employee Empowerment: The Foundation of a Strong Business Read More »

Email app symbol on a phone or computer screen.

Outsmarting the hackers behind today’s Business Email Compromise attacks

Business Email Compromise (BEC) campaigns have become increasingly prevalent and costly, with the FBI estimating global annual losses in the billions of dollars. This sophisticated form of cybercrime targets organizations by exploiting email systems to deceive employees and manipulate them into performing unauthorized transactions or divulging sensitive information.   Understanding the mechanisms of BEC and implementing

Outsmarting the hackers behind today’s Business Email Compromise attacks Read More »

5 sure-fire strategies for achieving a reasonable cybersecurity baseline

Strategies for achieving a cybersecurity baseline

The cybersecurity industry offers an abundance of high-quality, constructive guidance for organizations. Although this is something to be celebrated, it can also be overwhelming for business and technology leaders who are grappling with the following questions: How to determine if the organization’s current cybersecurity posture is good enough? How to establish the right priorities within

Strategies for achieving a cybersecurity baseline Read More »

Your future is secured when your business can use, maintain, and improve its technology

Request a free consultation