Skip to content

Cybersecurity

Cybersecurity trends.

Part I: Mastering Your Cyber Threat Preparation

Part I: Mastering Your Cyber Threat Preparation

The 5 Levels Of Cyber Readiness And Business Resilience Organizations around the world spend more each year to protect themselves from cyberattacks. Gartner predicts that global spending on security and risk management solutions will grow to $261.9 billion by 2026. Given its critical role in a company’s cyber

Blak Cyber Podcast: Interview with Yatia Hopkins

Blak Cyber Podcast: Interview with Yatia Hopkins

Cybersixgill Presents an encore episode of George McPherson's Blak Cyber podcast. Subscribe: Apple | Spotify | Google | RSS | Download Blak Cyber podcast’s George McPherson sits down with Yatia “Tia” Hopkins, an award-winning cybersecurity executive who is currently Field CTO and Cyber Risk Strategist at eSentire. She is also an adjunct professor

Mastering Your Cyber Threat Preparation

Mastering Your Cyber Threat Preparation

Organizations around the world spend more each year to protect themselves from cyberattacks. Gartner predicts that global spending on security and risk management solutions will grow to $261.9 billion by 2026. Given its critical role in a company’s cyber defense strategy, Cyber Threat Intelligence (CTI) represents a multi-billion

Blak Cyber Podcast: Interview with Chelsea Pierre

Blak Cyber Podcast: Interview with Chelsea Pierre

Cybersixgill Presents an encore episode of George McPherson's Blak Cyber podcast. Subscribe: Apple | Spotify | Google | RSS | Download This week’s Blak Cyber podcast with George McPherson presents an interview with Chelsea Pierre, CEO of Blerds Leading Technology, whose vision is to create the strongest group of minority leaders in the

CISA’s New Directive BOD 23-01: The First Step in Building an Efficient Cybersecurity Posture

CISA’s New Directive BOD 23-01: The First Step in Building an Efficient Cybersecurity Posture

Earlier this month, the Cybersecurity and Infrastructure Security Agency (CISA) issued Binding Operational Directive (BOD) 23-01, which focuses on "Improving Asset Visibility and Vulnerability Detection" on Federal Networks. The directive sets baseline requirements for federal civilian executive branch (FCEB) agencies, mandating them to better account for what resides on their

Blak Cyber Podcast: Interview with Keyaan Williams

Blak Cyber Podcast: Interview with Keyaan Williams

Cybersixgill Presents an encore episode of George McPherson's Blak Cyber podcast. Subscribe: Apple | Spotify | Google | RSS | Download In this week’s Blak Cyber podcast, host George McPherson sits down with Keyaan Williams, founder and Managing Director of Cyber Leadership and Strategy Solutions (CLASS-LLC). A global professional services firm, the company

Why You Need to Update Your Software and Apps

Why You Need to Update Your Software and Apps

Cybersecurity Tips and Best Practices to Celebrate Cybersecurity Awareness Month In celebration of Cybersecurity Awareness Month, we continue to share weekly cybersecurity tips so that you can protect yourself from online threats. Whether at home or work, by arming yourself with the right tools and knowledge, you can make smarter

How to Protect Your Online Accounts

How to Protect Your Online Accounts

Cybersecurity Tips and Best Practices to Celebrate Cybersecurity Awareness Month October is Cybersecurity Awareness Month, and this year’s theme is “See Yourself in Cyber” to bring recognition to the fact that cybersecurity, while complex, is about people. To celebrate, each week throughout the month we will introduce one of

Basing vulnerability management solely on CVSS scores is risky business

Basing vulnerability management solely on CVSS scores is risky business

Cybersixgill’s end-to-end Dynamic Vulnerability Exploitation takes a contextual, more accurate approach to vulnerability management and prioritization. This year, back-to-school time coincides with increased cyberattacks against higher education institutions. A recent survey shows that more than 60 percent of colleges and universities experienced ransomware attacks in the past year, costing

How Risk Management Can Help Strengthen Cybersecurity

How Risk Management Can Help Strengthen Cybersecurity

Companies hire cybersecurity analysts and managed IT security services to protect their vital assets. But that's not how it works. Cybersecurity specialists cannot shield anyone's data and privacy; instead, they can walk you through the best ways to manage risks and avoid cyber threats. After all, nothing is 100% safe

DarkWebster Word of the Week: Doxing

DarkWebster Word of the Week: Doxing

To understand the dark web, you need to know the latest vocab. Now you can learn a new slang term each week with DarkWebster, presented by Cybersixgill. This week's word of the week is Doxing.