Insights
Why CBI
Services
Security Programs
Advanced Testing
Incident Response
Architecture & Integration
Strategic Staffing
Managed Security
Products
Careers
Work With Us
Career Opportunities
Company
About Us
Leadership
Community
Reseller & Referral Partners
Events
Contact Us
Insights
Why CBI
Services
Security Programs
Advanced Testing
Incident Response
Architecture & Integration
Strategic Staffing
Managed Security
Products
Careers
Work With Us
Career Opportunities
Company
About Us
Leadership
Community
Reseller & Referral Partners
Events
Contact Us
Sitemap
Pages
About Us
Advanced Testing
Architecture & Integration
Automotive
Career Opportunities
Community
Contact Us
Decipher the Code
Digital Forensics & Incident Response
Events
G2G Marketplace
Home
Incident Response
Insights
Leadership
Managed Security
Partners
Penetration Testing Scoping
Privacy Policy
Product
Ransomware
Search
Security Programs
Services
Sitemap
Strategic Services
Strategic Staffing
Vertical – Financial
Vertical – Government
Why CBI
Why CBI – Obsessed About Cybersecurity
Why CBI – The Team You See
Why CBI – Today and Tomorrow
Work With Us
Zero Trust
Why CBI – Boardroom Ready
Reseller & Referral Partners
Insights
Preflight Check for Database Activity Monitoring Implementation
Tips for Getting IAM Implementation Right
Threat Intel Report | May 2023
How Synching Managed Providers Leads to Better Results
Threat Intel Report | April 2023
A Strong Data Protection Program Starts With These 9 Cornerstones
TLS 1.3 Securely Raises the Speed Limit on the Internet Highway
Threat Intel Report | March 2023
2022 Pentesting: A Red Team Review
PCI DSS v4.0 Is Coming–Here’s What You Need to Know Now
Threat Intel Report | February 2023
How a vCISO Helps Combat These Top 5 Security Concerns
Is Your IAM Program Held Up by These Common Blockers?
Threat Intel Report | January 2023
Threat Intel Report | December 2022
3 Ways to Avoid Online Fraud This Holiday Shopping Season
Threat Intel Report | November 2022
Air Force Airman Transitions to Civilian Cybersecurity Career
Experts Share Top Points for Cybersecurity Awareness Month and Beyond
Security Alert | OpenSSL Critical Vulnerability
Threat Intel Report | October 2022
5 Things New Research Tells Us About Organizations’ Zero-Trust Journeys
Realizing the ROI of Penetration Testing as a Service
Threat Intel Report | September 2022
Think Outside the Box for a Better NIST 800-53 Assessment
ICYMI: 5 Themes From Black Hat 2022
Shared Cloud Security Model: An Illustrated Guide
IBM Cost of a Data Breach Report: What You Need to Know
Threat Intel Report | August 2022
Penetration Testing as a Service Keeps Cybersecurity in Motion
Conquer Third-Party Risk With This 8-Step Roadmap
Stealing the Bank Vault Codes via Insecure Microsoft Default Settings
Threat Intel Report | June 2022
5 Big Ideas from RSA 2022
The Why and How of Identity & Access Management
What to Look for in a Penetration Testing as a Service [PTaaS] Provider
Threat Intel Report | May 2022
Threat Intel Report | April 2022
CBI Is Now CBI, A Converge Company
Top 5 Pitfalls of EDR Programs
Defending Against Ransomware Attacks: 11 Best Practices for Success
Modern-Day Extortion
Threat Intel Report | March 2022
Petroleum Firm Shifts and Modernizes Its Active Directory Provisioning and Management
Security Alert | Security Impacts Ukrainian & Russian Conflict
CBI Ponemon Ransomware Report 2022
Threat Intel Report | February 2022
Cybersecurity and the Automotive Industry: A Management Perspective
Automotive Cybersecurity | Regulatory Pressures & Stressors
Security Alert Log4j Update #2
Dated 12.20.21
Aaron Mullinax Joins CBI as Vice President of Architecture and Integration
Security Alert Log4j Update #1 Dated 12.17.21
Log4j High-Risk Vulnerability
Financial Services Company Migrates On-Premises Workloads to the Cloud
Financial Organization Required Stronger Security Awareness Training & Vulnerability Management
Manufacturer Uncovers Source Code Management and VPN Vulnerabilities
Industrial Manufacturer Mitigates Ransomware Without Paying Attackers
Automotive Company Recovers From Ransomware & Strengthens Security Posture
Infographic: Ten Work-From-Home Cybersecurity Tips
Best Practices for Security Awareness Training Success
CBI Promotes Shaun Bertrand to Chief Services Officer
Accelerating Threat Detection & Response With XDR
Zero Trust:
What It Is and Why You Should Care
Cybersecurity in the Pandemic Era: A Look Back at Black Hat USA 2021
Protecting Data with SASE and DLP: 5 Keys to Success
Confronting Cybersecurity Challenges and Incident Response in the Cloud
Accelerating Your Zero Trust Journey
Kaseya Ransomware Attack: What You Need to Know
9 Keys to Incident Response Readiness
What is SASE, and Why Do You Need It?
What is SASE and Why Should You Care?
2021 Verizon DBIR Roundtable Discussion
The Good, The Bad and The Ugly: Lessons From AppSec Pentesting
Best Practices for Web Application Security
Hafnium: Lessons Learned and Recommendations from Incident Responders
Non-Negotiable Cybersecurity: New Regulations in the Auto Industry
Overcoming the Struggle to Operationalize Threat Intelligence
Security Alert | SAP Vulnerabilities Under Active Attack
2020 Cybersecurity in Review: A Red Team’s Perspective
CrowdStrike's 2021 Global Threat Report
Security Alert | Microsoft Exchange Vulnerability
CBI Named to the CRN MSP 500 List for 2021
Web Application Testing: Infiltration through Obfuscation
Web Application Testing: An Essential Component of Red Team Activities
Infographic: Ten Cybersecurity Priorities for 2021
Ten Cybersecurity Priorities for 2021
Infographic: Transform Your DLP Strategy to Guard Your Growing Datasphere
Security Alert | Healthcare Ransomware Attacks
Prioritize Web Application Testing In Your Security Program
Is your kiddo asking about hackers and internet bad guys?
Don’t Let Your Car Dealership Become a Target – Ensure Your Client Data is Compliant and Secure
Recap: C-Suite Perspectives – Executive Leadership During and After a Crisis
CBI Security Alert: 'SigRed' Windows DNS Server Remote Code Execution Vulnerability
Press Release: BullsEye Telecom Adds CBI Expertise to Security Offerings
On-Demand Panel: A More Secure Remote Access Model
CBI Security Alert: Ripple20
CBI Security Alert: EKANS
Keep Your Family Cybersecure
To Test or Not to Test—That is the Question
Six Ways to Improve Your Company’s Incident Response Strategy
Video: Remote Access Assessment Series: Volume 3 - End User Protection
Beyond IT / OT to Shared Risk-Based Decision-Making
CBI Sponsors OneMagnify Live to Support Henry Ford Hospital Nurses
Established Medical Device Manufacturer Revives Legacy IT to Protect It From Ever-Evolving Security Threats
Video: Remote Access Assessment Series: Volume 2 - Email Security
American Energy Company Overhauls its IT, Minimizes Complexity and Maximizes Overall Cybersecurity
Video: Remote Access Assessment Series: Volume 1 - EDR
A Proven Energy Industry Supplier Needed a New, Full-Scale Cybersecurity Program
End User Security: Six Steps to Success
Email Security: Best Practices for the Remote Workforce
Six Ways to Mature your EDR Program—from End to End
Securing Your DLP Future in the Unsecured Datasphere
A Large Financial Institution Needed More Than Traditional Penetration Testing
Cloud Security is Everyone’s Business
Regional Healthcare Network Enhances DLP Program to Improve Security Posture
Ready, Set, GO into the Boardroom and Win
Video: Remote Access Best Practices
Large Automotive Supplier Needed Expert Help Protecting Its Perimeter
Start Folding Now: CBI is Helping to Find a Coronavirus Cure - and So Can You
Mitigating the Cybersecurity Impact of the Coronavirus
Why Today’s Digital Forensics Can Feel Like the Wild West (and What to Do About It)
How to Secure Your Factories: Cybersecurity on the Production Floor
CBI Security Alert: Wawa Breach
CBI Security Alert: Microsoft Breach
End of Support for Windows 7, Server 2008 and SQL 2008 – What to do?
Recap: EDR Webinar with CrowdStrike
Preparing for 2020: Make Your New Year Cyber-secure
CBI Effect Podcast: Live from GrrCON 2019
How Anonymous is Cryptocurrency?
CBI Effect Podcast: Episode 7 - How to Build an Effective Cybersecurity Program
CBI Effect Podcast: Episode 6 - DLP with Forcepoint
Leveraging Data Discovery to Find Sensitive Data
CBI Security Alert: Restaurant Credit Card Breach
Video: CBI Patching and Hardening Assessments
BigFix: HCL Patch Tuesday Webinars
CBI Effect Podcast: Episode 5 - Patching and Hardening
CBI Security Alert: Internet Explorer Zero Day Exploit
Patching and Hardening – Does it matter?
Video: GrrCON 2019: Surfing and Security
How G2G Marketplace Helps Government Improve Cybersecurity
Dark Web Revealed and Explained
Emotet: Back from Summer Vacation
Infographic: Integrated Cyber Defense
CBI Effect Podcast: Episode 4 - Integrated Cyber Defense
6 Reasons Integrated Cyber Defense Will Be a Game-Changer
Is your organization seeing 2020?
CBI Promotes Chris Burrows to Chief Strategy Officer
CBI Effect Podcast: Episode 3 - Advanced EDR
Duck Hunting: Learning to spot and prevent malicious hardware attacks
Cybersecurity Visibility - Seeing is Protecting
Black Hat 2019: A Look Back
CBI Effect Podcast: Episode 2 - Vulnerability Management
CBI Security Alert: Capital One Data Breach
Video: New CBI Website Announcement
Infographic: MITRE ATT&CK Framework
FaceApp: Keep Calm and Manage Permissions
CBI Effect Podcast: Episode 1 - MITRE ATT&CK Framework
Choosing Your Cybersecurity Framework: Tips and Gotchas
Keep Your Kids Cybersecure
Data is Making Your Organization Smarter
How To Achieve IT/OT Convergence
CBI Security Alert: Evolution of BEC Scams
CBI's Chris Burrows Speaks at IoT Tech Connect 2019
BigFix Acquisition
CBI Security Alert: Microsoft Issues Patch to Secure Older Windows Versions from Wormable Attacks
CBI Sponsors 2019 Michigan InfraGard Annual Conference
CBI Security Alert: Lessons Learned from the Baltimore Ransomware Attack
Rowhammers And RAMBleeds – Evolving Data Threats
Operationalizing the MITRE ATT&CK Framework
Release McCracken! Building a Hash Cracking Rig at CBI
Testimonials
ATS - Alix Partners
AIM - JACK Entertainment
PenTest - United Wholesale Mortgage
Integration Services - LTU
Security Architecture - Northside Hospital
Incident Response - Nachi Robotics
Ransomware - Westmoreland Mining
General ATS - Kaufman Financial Group
General ATS - Nexteer Automotive
PenTesting - Northwestern MI College
Testimonial Categories
ATS General
Emerging Threats
Incident Response
Integration Services
Penetration Testing
Security Architecture
I Need To...