SecuLore Blog

Subscribe to our cybersecurity blog to receive thought leadership on topics of all things cybersecurity.

How USB Malware Attacks Are Surging

Attacking networks through malware-infected USB drives used to be a popular tool for cybercriminals before cloud-based ...

Subscribe to our cybersecurity blog

Balloons, Apps, AI and Data Privacy

With the increasing rise in cyber attacks across all industry sectors, there are rising security concerns. The time to ...

What is Cyber Insurance and is It Worth It?

There is a lot of minutiae that goes into exactly how cyber insurance is defined. At its base, cyber insurance is ...

Prioritize Network Monitoring, Vigilance with CISA’s Cloud Security Technical Reference Architecture

Last year, Executive Order 14028 was signed to help with, “Improving the Nation’s Cybersecurity” and directed the ...

What to Know About the Cyber Incident Reporting for Critical Infrastructure Act of 2022

If you haven’t been living under a rock, it would be hard not to notice the cyber attacks and threats on public and ...

What You Should Look for in Cloud Security

The trend to use cloud-based applications and services saw its growth accelerated by the pandemic, and now with a great ...

Russian Cyber Threats to U.S. Critical Infrastructure

On February 16, 2022, the Cyber Security and Infrastructure Security Agency (CISA), FBI, and NSA issued joint ...

Public Safety and Services Already Feeling Wide Impact of Kronos Ransomware Attack

Kronos, a widely used multinational workforce management platform, was hit with a serious ransomware attack the second ...

In wake of the Log4j Vulnerability, increase focus on Cybersecurity Posture

2021 saw notable increases in cyber attacks on critical infrastructure and public safety. The Colonial Pipeline, the ...

NOC vs SOC: What is the Difference?

A Network Operations Center (NOC) and a Security Operations Center (SOC) are similar in that they are both instrumental ...