SecuLore Blog

Subscribe to our cybersecurity blog to receive thought leadership on topics of all things cybersecurity.

Prioritize Network Monitoring, Vigilance with CISA’s Cloud Security Technical Reference Architecture

Last year, Executive Order 14028 was signed to help with, “Improving the Nation’s Cybersecurity” and directed the ...

Subscribe to our cybersecurity blog

What to Know About the Cyber Incident Reporting for Critical Infrastructure Act of 2022

If you haven’t been living under a rock, it would be hard not to notice the cyber attacks and threats on public and ...

What You Should Look for in Cloud Security

The trend to use cloud-based applications and services saw its growth accelerated by the pandemic, and now with a great ...

Russian Cyber Threats to U.S. Critical Infrastructure

On February 16, 2022, the Cyber Security and Infrastructure Security Agency (CISA), FBI, and NSA issued joint ...

Public Safety and Services Already Feeling Wide Impact of Kronos Ransomware Attack

Kronos, a widely used multinational workforce management platform, was hit with a serious ransomware attack the second ...

In wake of the Log4j Vulnerability, increase focus on Cybersecurity Posture

2021 saw notable increases in cyber attacks on critical infrastructure and public safety. The Colonial Pipeline, the ...

NOC vs SOC: What is the Difference?

A Network Operations Center (NOC) and a Security Operations Center (SOC) are similar in that they are both instrumental ...

Knowing Your Cyber Posture and Why It’s Important

In today’s world of increasing dependency on computer networks and connected devices, the question of being hit with a ...

CISA MS-ISAC Publish Updated Ransomware Guide

September, 2020 CISA (Cybersecurity Infrastructure Security Agency) and MS-ISAC (Multi-State Information Sharing & ...