Cybersecurity in a Work-from-Home Culture

More and more people are working from home more frequently. While this is great for work-life balance and productivity, it does pose a cybersecurity risk for your company’s network. This blog will look at how home network security can impact the cybersecurity of your business.

View More

Mid-Year Review: Industry Perspective Part 2

This blog will take a look how the cybersecurity industry has fared so far in 2019, including updates from major headlines, new trends industry events, product launches, etc. It will also dive into what Armor predicts will take place over the next few months in terms of industry trends and insights.

View More

Navigating the Nuances of Congress’ Proposed Hack Back Bill

In 2017, members of Congress originally introduced the “Active Cyber Defense Certainty Act,” more commonly known as, the “Hack Back Bill.” This blog will give a comprehensive overview of the Hack Back bill, from a technical and legal perspective, and provide insight on proactive measures to mitigate recovery efforts.

View More

The Baltimore Ransomware Attack and What Enterprises Need to Know to Protect Themselves

On May 7, news broke that the City of Baltimore joined the ranks of at least 22 other U.S. government organizations compromised by a ransomware attack in 2019. Since then, the threat actor holding the city’s data for ransom has publicly taunted Mayor Bernard C. “Jack” Young on Twitter in hopes of collecting payment. Our team has closely followed this incident, tracking the Twitter profile of the hacker, and analyzing the ransomware used in the attack. This event reminds us how prolific ransomware has become over the past several years.

View More

A Day in the Life at Armor: Chris Hinkley

We’re collecting the stories of Armor’s top-preforming security professionals to show you the human element of cybersecurity. In this interview, we talk to Christopher Hinkley, our lead ethical hacker.

View More

From Civilian to Cyberwarrior

What is the appropriate schooling, training, and certifications required to proceed along the path to becoming a cyberwarrior? Are there skills from other professional backgrounds that lend themselves well to a career fighting cybercrime? Read our cyberwarrior blog to find the answers.

View More