OthersPress Release We are happy to announce that Canfield CyberDefense Group, has been approved to be a Certified Third-party Assessor Organization (C3PAO).Olumide AkinwekomiAugust 2, 2021
Others Continuous Risk Assessment and Information Technology (IT) Environment’s Health Every organization, regardless of its mission statement or business operating sector, has its own risk profile. Each organization should carry…Olumide AkinwekomiJuly 28, 2021
AI Cybersecurity Software ProductOthersThreat Post Defending Against the Current Russian Cyber Threats The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint cybersecurity advisory about…Olumide AkinwekomiMay 17, 2021
Breaches and incidentsOthers How Are You Prioritizing Resilience in the Cyberspace? Cyber resilience is an Enterprise's ability to plan, adapt, and recover when cyberattacks occur. If an Enterprise can protect itself…Olumide AkinwekomiFebruary 18, 2021
Others Warning on VPN Vulnerability As the organization adapts to Coronavirus, there is a spike in remote work. Organizations are required to connect to remote…Olumide AkinwekomiOctober 28, 2020
Others CYBERSECURITY IN THIS DISPENSATION In the last few years, the cybersecurity practice force is changing speedily, and the impact of this test becomes more…Olumide AkinwekomiAugust 3, 2020
Others Critical Flaws of Zoom Video Conferencing Software that are Prone to Attackers Many individuals have resorted to using Zoom, especially since the beginning of this pandemic which has created restrictions in schools,…Olumide AkinwekomiJune 8, 2020
Others Impersonation Attacks on Microsoft Teams Some Team users have experienced two different attacks by phishing on Office 365 logins. A compelling cyber threat that imitates…Olumide AkinwekomiMay 7, 2020
Others Crush All Cyber Attacks with CCG CheckMate. Are your networks and systems well protected? Are you certain your systems are not vulnerable to hackers? Do you possess…Olumide AkinwekomiApril 29, 2020
Others Why Traffic Capture is very critical when it comes to Network Security Monitoring Traditional security controls are insufficient to protect from cyberattacks in the digital domain, compelling organizations to adopt a Zero Trust…Olumide AkinwekomiApril 20, 2020