Blog

Noodlophile Stealer Evolves: Targeted Copyright Phishing Hits Enterprises with Social Media Footprints 

Brad LaPorte | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Adaptive Exposure Management
Fileless Malware
Preemptive Security
Ransomware

Brad LaPorte | 28 Jul 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Brad LaPorte | 15 Aug 2025

Can You Secure Legacy Windows Systems?

Legacy Security

Brad LaPorte | 19 Dec 2024

The Countdown to Windows 10 End of Life: What IT Teams Need to Know

Automated Moving Target Defense
Legacy Security
Microsoft

Jay Kurup | 21 Oct 2024

Windows Server 2012 End of Life –– How do You Secure Legacy Servers?

Legacy Security

Oren Dvoskin | 05 Jul 2023

Attacks Against OT & Industrial Organizations Are on the Rise

Automated Moving Target Defense
Defense-in-Depth
Legacy Security