Michael Markulec

technology executive, cyber-security guru, politician, rugby player, deadhead, brewer, former army officer, crossfitter, and hard-drinking calypso poet.

2 min read

The NIST proposal to update SP 800-171

In today's digital landscape, organizations of all sizes face the constant threat of cyberattacks and data breaches. The National Institute of Standards and Technology (NIST) has long been at the forefront of providing guidance and frameworks to...

Read More

2 min read

Zero-day MOVEit Transfer Vulnerability

In today's interconnected world, small to medium-sized businesses face a constant threat of cyberattacks. Organizations must stay informed about...

Read More

2 min read

Managed Detection and Response (MDR) for SMBs

Small and medium-sized businesses face increasing challenges due to limited resources and expertise in today's cybersecurity landscape. Managed...

Read More

2 min read

Maximizing Cybersecurity Investments for Small and Medium-Sized Businesses

Every day small and medium-sized businesses (SMBs) face increasing cyber threats. Despite limited resources, SMBs need to allocate their...

Read More
Fitting puzzle pieces together

2 min read

Collaborative Cybersecurity Strategies for SMBs

Cybersecurity has become a pressing concern for businesses of all sizes. However, a recentHarvard Business Review (HBR)article sheds light on a...

Read More
Envelope with padlock

1 min read

Why is DMARC important for SMBs

Email security is critical for businesses of all sizes. One way to enhance email security is by using DMARC (Domain-based Message Authentication,...

Read More

1 min read

How Multi-Factor Authentication protects your business

In today's digital age, online security has become a significant concern for businesses of all sizes. Cyberattacks are increasing, and small to...

Read More
China

1 min read

China passes Revised Counter-Espionage Law

The updated counterespionage law in China, which is expected to pass soon, will broaden the definition of espionage and expand the scope of the law...

Read More
5 Cybersecurity Myths

1 min read

5 Cybersecurity Myths putting your Business at Risk

In today's digital age, cybersecurity is essential for businesses of all sizes. While larger companies often have dedicated IT departments and larger...

Read More
Person on cell phone with message warning icon

2 min read

How to protect yourself from Smishing

Smishing, a form of phishing carried out through mobile text messaging or SMS, is on the rise, and everyone is vulnerable to the threat. In this type...

Read More