Log4Shell in a Nutshell: Armor Unpacks the Prolific Zero-Day Attack

Within a matter of days, the vulnerability to Log4j (versions 2.0 to 2.14.1), which provides Java library logging capabilities sent shockwaves through the corridors of businesses from the boardroom to the data center.  The zero-day attack known as “Log4Shell” (CVE-2021-44228) is concerning on a number of fronts that differ from previous high-profile attacks. The sheer […]

View More

Anatomy of Compliance Audits

Compliance audits can be quite intimidating, especially if you’re new to them. For many organizations, it’s something that’s becoming increasingly unavoidable. In this post, we introduce you to the various aspects of an audit, what an auditor expects from you (the complying organization), and what you can do to make the auditing process as smooth […]

View More

Security Insights – Q2 2021 Updates

Threat Analyst Lead Yaz Johnston dives into our latest security insights, where you can learn about upcoming HTML sanitization for your favorite web browsers, what top 10 malware threats we’ve seen in the past quarter, and how ransomware continues to steal the security spotlight. HTML Sanitization Google, Mozilla, and security firm Cure53 announced they are […]

View More

Check out the Cybersecurity and Compliance Assessment

Armor’s cybersecurity and compliance assessment delivers a baseline assessment for your organization’s overall cybersecurity and compliance posture.

View Assessment

Introducing Armor Anywhere with Endpoint Detection and Response (EDR)

As the pandemic drove employees into their homes, businesses turned to one logical solution that would keep operations going—remote work. This major change, however, has drawn a much larger number of employees outside the safe confines of the corporate firewall and, in turn, dramatically increased businesses’ exposure to cyberthreats. The rise of web-based activities, an […]

View More

Creating a Culture of Compliance

Joint Blog with HIPAATrek, Co-Author: Sarah Badahman, CHPSE, CEO/Founder, HIPAAtrek Office culture has greatly evolved over the years, impacted by generational differences, laws and legislature, and even design aesthetics. And as technology has changed, one of the most impactful influences on office culture has been digital transformation. Fueled by growing usage of applications, remote work […]

View More

Securing the Cloud for Critical Access Hospitals

Joint Blog with HIPAATrek, Co-Author: Sarah Badahman, CHPSE, CEO/Founder, HIPAAtrek While medical treatment innovation may move at the speed of light, the same cannot be said for the rates at which healthcare providers have migrated to the cloud. The largest obstacle to widespread adoption? The responsibility of securing their data within the cloud. And the […]

View More

Forrester's Total Economic Impact Report of Armor Anywhere

Discover the true ROI of Armor’s cloud security solution Armor Anywhere.

Check it out

Investment Apps Are Crashing, Are Your Transactions Secure?

$GME (GameStop) and $AMC (AMC Entertainment) are breaking the market. These two stocks, driven by retail investor hype, have created pandemonium on Wall Street. Hedge funds are going bankrupt, and brokers are overwhelmed. None seem more overwhelmed than the SaaS brokerages like Stash App and Robinhood. Stash App has slowed to a crawl if you […]

View More

Hero Spotlight: Cheryl Gant

Change Catalyst: Armor Hero Cheryl Gant For Armor Hero Cheryl Gant, diversity and representation has always been important. And though she has followed an unconventional path into her technology career, this Armor Hero has made herself at home and taken up the call to help move Armor’s diversity and inclusion efforts onward and upward. As […]

View More

Learning from the Equifax Breach: Lessons for Healthcare Leadership

By Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP), CCSFP, Member (FBI) InfraGard & HITRUST CSF® Assessor Council Executive Summary In the future, when we look back, this Equifax data breach very well could be the tipping point for cybersecurity. A watershed moment. Cybersecurity, for the next few years, will be a significant “C” level priority. Executives […]

View More