by Jeff Surratt | Feb 4, 2021 | Blogs
In July of 2020, we discussed seeding open-source projects with compromised components. In the past six months, commercial and enterprise software developers became more disciplined in keeping developed open-source software libraries updated to reduce the risk of...
by Jeff Surratt | Feb 3, 2021 | Blogs
Despite a 25-year history, Business Email Compromise (BEC) remains a highly utilized and successful phishing attack. So successful that the methodology is used by cybercriminals and intelligence operators alike. It is identified as one of the most financially damaging...
by Jeff Surratt | Dec 21, 2020 | Blogs
Cybercriminals love the holidays, through social media platforms like Facebook, phishing has turned to digital social networks and prior stolen information to prey on unsuspecting victims. Sparity has provided many presentations with the term “data aggregation”....
by Jeff Surratt | Dec 18, 2020 | Blogs
All the following aspects of your upstream communication will directly impact your departments, the boards confidence in you and your teams and most importantly the annual budget. As 2020 ends it will be more important than ever to have clearly defined objectives for...