Article2, Cybersecurity Adam Evans, CISSP Article2, Cybersecurity Adam Evans, CISSP

What are SIEM and SOAR?

SIEM, or Security Information and Event Management, is a platform that collects and stores all the logs from various sources, including firewalls, servers, endpoints, and cloud platforms, in one centralized location. This allows security teams to monitor and analyze all the logs in one place, making it easier to detect any anomalies or potential security breaches.

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

Why Should You Have Cyber Insurance?

In today's digital age, businesses and individuals face a growing threat of cyber-attacks, data breaches, and other types of cyber incidents. These incidents can cause significant financial and reputational harm to those affected. Cyber insurance is a type of insurance designed to protect against these risks.

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

When Do You Need Security Awareness Training?

Security awareness training is a critical component of any organization's security strategy. It involves training employees on common security risks and how to recognize and avoid them. This includes identifying phishing emails, scam calls, and text messages, as well as learning how to follow electronic funds transfer procedures and more!

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

How Could Hackers Use AI?

At the end of 2022 artificial intelligence entered the mainstream with tools like ChatGPT, DALL E, and more, becoming wildly popular. As with any tool, they can be a powerful force for positive change in the world, but in the wrong hands they could cause harm. So how is AI technology empowering hackers?

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

Is Your CEO Really Texting You?

In today’s fast-paced work environment, it’s not uncommon to receive messages and emails from colleagues and superiors requesting assistance or information. However, with the rise of cyber threats, it’s important to take a moment to pause and think before reacting to these messages, especially when they involve financial transactions or sensitive information.

Read More
Cybersecurity, Article2 Adam Evans, CISSP Cybersecurity, Article2 Adam Evans, CISSP

New Microsoft Outlook Vulnerability 

Attention all Microsoft Outlook users! A new vulnerability has been revealed, and it's a pretty scary one. Essentially, a malicious entity can send an email to a user without any action on their part, and potentially obtain their password. Considering how much sensitive information is shared via email, this is a major concern.

Read More
Cybersecurity, Article2 Bob Coppedge Cybersecurity, Article2 Bob Coppedge

What is Laptop Encryption?

I just stole a laptop and took out the hard drive. I now have access to everything on it, regardless of the password used to log on. Just attach it to another computer, and I've got everything. Unless it's encrypted. Data encryption is the process of encoding data stored on your laptop so that it can only be accessed by an authorized user.

Read More