What Is a Managed Security Service Provider (MSSP)?
by Geoff Yeagley on July 1, 2025 at 4:53 PM
As cyber threats continue to evolve and become more sophisticated, organizations across every industry are realizing that protecting their digital assets isn’t just an IT concern—it’s a business imperative. Unfortunately, many companies lack the in-house expertise, tools, or bandwidth …
2FA vs. MFA: What's the Difference?
by Geoff Yeagley on February 16, 2024 at 11:30 AM
Logging into your online accounts, a process known as "authentication," is essentially confirming your identity to the service provider. In the past, this was typically done using a username and password. However, this method proved to have its flaws.
TISAX Compliance: A Comprehensive Guide to Certification
by Geoff Yeagley on November 9, 2023 at 3:42 PM
The automotive industry is in the midst of a massive shift. The transformation is driven by digital advancements, including autonomous vehicles, increased in-car connectivity, and a surge in electric vehicle production. These tech-driven changes, along with sprawling global supply cha …
MIME Sniffing: What Is It? What Are the Security Implications?
by Geoff Yeagley on May 9, 2023 at 2:45 PM
Multipurpose Internet Mail Extension (MIME) sniffing has been in use for decades to allow a browser to render content when there is some question about what type of data the content contains. However, MIME sniffing can also open your organization and end users up to serious cybersecur …
Cybersecurity Controls & Configurations – Are You Locking Your Doors?
by Geoff Yeagley on July 20, 2022 at 3:15 PM
Summertime is the peak time for people to go on vacation. The kids are off from school and the weather is finally nice in most of the country. When you go on vacation, no matter how far you travel, there are certain precautions that you take to ensure that your home is safe while you …
New Version of the Critical Security Controls Released
by Geoff Yeagley on April 25, 2018 at 10:00 AM
Last month, the Center for Internet Security (CIS) released version 7.0 of the Top 20 Critical Security Controls. This represents a significant revision from the previous version (6.1) and introduces some interesting changes. Before we dig into the changes to the controls, if you are …