Skip to the main content.

Michael Markulec

technology executive, cyber-security guru, politician, rugby player, deadhead, brewer, former army officer, crossfitter, and hard-drinking calypso poet.

Digital Enterprise Infrastructure Map chart

5 min read

Mapping Security Risks with Effective Risk Management Strategies

Understanding and mitigating cybersecurity risks before they disrupt operations is no longer optional—it's the foundation of business resilience and regulatory compliance in today's threat landscape.

Read More
AI Data Leakages

7 min read

Preventing AI Data Leakage: Best Practices for Business Security

As organizations rapidly adopt AI technologies, sensitive data is increasingly at risk of exposure through model training, unauthorized access, and...

Read More
Email Security

6 min read

How Companies Can Improve Email Security on Mobile Devices

Mobile devices now account for over 60% of corporate email access. Yet, they remain one of the weakest links in enterprise security—exposing...

Read More
Cybersecurity Fraud Prevention

5 min read

Cyber Tax Fraud Prevention Strategies Every Small Business Should Know

Small businesses lose millions annually to tax-related cyber fraud—discover the critical security strategies that can protect your organization from...

Read More

5 min read

How to Create a Conditional Access Policy in Microsoft Entra ID

Strengthen your organization's identity security posture by implementing conditional access policies that protect your cloud resources without...

Read More
Acceptable Use Policy

5 min read

Understanding Acceptable Use Policy: Safeguarding Company Technology

An Acceptable Use Policy is your first line of defense against insider threats, data breaches, and compliance violations—learn how to build one that...

Read More
CFO Cybersecurity

5 min read

The CFO's Role In Cybersecurity

As cyber threats increasingly impact financial performance and business continuity, CFOs are emerging as critical partners in building resilient...

Read More
Cybersecurity Risk as Enterprise Risk

6 min read

Board Members Must Treat Cybersecurity As An Enterprise Risk: Insights From The NACD

Board directors face mounting pressure to elevate cybersecurity from an IT concern to a strategic enterprise risk that demands governance-level...

Read More
CMMC 2.0 Protects Sensitive Defense Information

6 min read

Understanding The DoD's Cybersecurity Maturity Model Certification (CMMC) 2.0 Program

Navigating CMMC 2.0 requirements is essential for defense contractors seeking to protect controlled unclassified information and maintain eligibility...

Read More
Cyber Shield

5 min read

Cyberattacks Getting More Adaptive And Harder To Detect: The Role Of Stolen Credentials, Fileless Techniques, And Generative AI Tools

Modern cyberattacks are evolving at an unprecedented pace, leveraging stolen credentials, fileless malware, and AI-powered tools to bypass...

Read More