Skip to content
TRAC-Logo
 

Frustration-Free Risk Management

Simplify cybersecurity risk management and tackle your cybersecurity challenges with ease. TRAC automates the tedious risk assessment process and produces customized results that align with regulations, best practices, and your strategic goals.

Blog_HeaderGradients-10

Blog

Press Release: SBS Issues World Password Day Reminder

SBS CyberSecurity urges Americans to enhance account security on World Password Day by reviewing and updating passwords.
Start Reading

Cyber Incident Reporting for Critical Infrastructure Act of 2022

On March 15, 2022, President Biden signed the Consolidated Appropriations Act, 2022, H.R. 2471, which is the fiscal year 2022 omnibus spending bill. Of special interest in the bill is the Cyber Incident Reporting for Critical Infrastructure Act of 2022.
Start Reading

Press Release: SBS CyberSecurity Announces Davidson, Patterson Friend of SBS Award Recipients

SBS CyberSecurity honors Kirby Davidson and Becky Patterson from GSB at the University of Wisconsin-Madison with the 2022 Friend of SBS Award.
Start Reading

Cybersecurity Through Global Conflict

The Russia-Ukraine conflict and rising cyber-attacks have sparked concerns about cybersecurity, prompting organizations to evaluate their protection measures.
Start Reading

Download: 5 Key Questions to Consider when Researching a VCISO Solution

Discover the benefits of outsourcing the information security officer role and find guidance on selecting a vCISO solution with this comprehensive guide.
Start Reading

Threat Advisory: Blockchain Ice Phishing

Stay informed about the latest phishing attack targeting web3 and blockchain front ends. SBS CyberSecurity has the details.
Start Reading

Kerberoasting - The potential Dangers of SPN Accounts

Discover the risks of granting local admin privileges to users and the potential drawbacks of the convenience it offers.
Start Reading

Threat Advisory: LockBit 2.0 Ransomware Group Attacking Financial Institutions

The LockBit 2.0 ransomware group is back with its Ransomware-as-a-Service affiliate model after a brief lull in August. Learn more about their previous name and operations from Prodaft threat intelligence team.
Start Reading

Top 5 Most Common Incident Response Scenarios

Learn about common incident response scenarios, and learn how to prepare, detect and identify, respond, and eradicate malicious cyber threats.
Start Reading

Risks of Granting Local Admin Rights to Users

Understand the risks of granting local admin rights to users and best practices to secure your systems and prevent unauthorized access.
Start Reading