Minimizing Threat of ShadowIT/App/AI
Reducing 0-day risks with Dynamic IP Blocklists
ABI vs. ACH: When Intelligence Analysis Feels Like Dating Two Very Different People
Summary: ABI tells you *what’s happening*. ACH tells you *why it’s happening*. One finds the mystery, the other solves the mystery. If intelligence frameworks were people, ABI and ACH would be the kind of couple you’d never seat next to each other at a dinner party. Activity-Based Intelligence (ABI) is the adventurous one always watching …
Read more “ABI vs. ACH: When Intelligence Analysis Feels Like Dating Two Very Different People”
Your Software needs Updates and so do your Employees
When people think about cyberattacks, they often picture hackers breaking into computers using secret codes or fancy tools. That’s one kind of threat called a technical intrusion. But there’s another, sneakier kind that doesn’t rely on technology at all. It’s called social engineering, and it targets people instead of machines. Both can cause huge damage. …
Read more “Your Software needs Updates and so do your Employees”

