Simply
Cyber Communiqués

connection.png
CDI 2020 _logo final.png
CDI 2020 _logo final.png
CDI 2020 _logo final.png
CDI 2020 _logo final.png
Stay up to date with Cyber Defense Intelligence Briefings
PTP_logo-FC-reversed side by side.png
CDI 2020 _logo final.png
  • Why Pillar

  • Services

    • Vulnerability Management
    • Security Remediation
    • Incident Response
    • Security Engineering
    • vCISO
    • Security Operations
    • Compliance
    • Tools Expertise
    • Threat Hunting
  • Resources

    • Ransomware Playbook
    • An Hour with an Expert
    • Podcasts/Webinars
    • Blog
    • Helpful Links
    • Communiqués
  • Intelligence

    • Alerts
    • CDI Live Briefings
    • Cyber Snippets
  • About Us

    • Who We Are
    • What We Do
    • Experience
    • Partners
    • Press Releases
    • Contact Us
    • Privacy Policy
  • More

    Use tab to navigate through the menu items.

    Are you cyber aware?

    • All Posts
    • Webinars and Podcasts
    • Blog
    • Press Release
    Search
    Don't Become a Ransomeware Victim
    • Jun 22

    Don't Become a Ransomeware Victim

    I have three letters for you...
    • Apr 12

    I have three letters for you...

    Manufacturing: A Key Target for Cyber Attacks
    • Feb 1

    Manufacturing: A Key Target for Cyber Attacks

    Log4j: Discover and Remediate
    • Jan 20

    Log4j: Discover and Remediate

    2022 Cyber security Wish List
    • Dec 8, 2021

    2022 Cyber security Wish List

    Managing Enterprise Risk
    • Sep 30, 2021

    Managing Enterprise Risk

    WHY "GOOD" SECURITY ISN'T GOOD ENOUGH:  THE DANGER LURKING IN MISCONFIGURATIONS
    • Aug 4, 2021

    WHY "GOOD" SECURITY ISN'T GOOD ENOUGH: THE DANGER LURKING IN MISCONFIGURATIONS

    Defend Against Sophisticated Ransomware - Here's How!
    • May 20, 2021

    Defend Against Sophisticated Ransomware - Here's How!

    Your First Line of Defense:  Patch and Configuration Management
    • May 18, 2021

    Your First Line of Defense: Patch and Configuration Management

    2021 Cybersecurity Budget Must-Have's
    • Dec 8, 2020

    2021 Cybersecurity Budget Must-Have's

    The time has come for Business Resumption Planning (COVID Style)
    • Jun 3, 2020

    The time has come for Business Resumption Planning (COVID Style)

    Tools Harmony improves return on spend
    • May 21, 2020

    Tools Harmony improves return on spend

    To  Zoom or Not to Zoom……
    • Apr 22, 2020

    To Zoom or Not to Zoom……

    Adapting and responding to the “New Normal”
    • Mar 31, 2020

    Adapting and responding to the “New Normal”

    COVID19 Cybersecurity Risks: Shifting to a “work-from-home” model
    • Mar 16, 2020

    COVID19 Cybersecurity Risks: Shifting to a “work-from-home” model

    Cyber Awareness in light of Heightened Geo-Political Tensions with Iran
    • Jan 6, 2020

    Cyber Awareness in light of Heightened Geo-Political Tensions with Iran

    Holiday Scams and Phishing Attacks
    • Dec 2, 2019

    Holiday Scams and Phishing Attacks

    4 ways to protect against the #1 source of cyber attacks
    • Jun 13, 2019

    4 ways to protect against the #1 source of cyber attacks

    Cyber Insurance Coverage in the Current Global Environment
    • Jun 13, 2019

    Cyber Insurance Coverage in the Current Global Environment

    Overcoming the budget challenge for cybersecurity spending
    • Jun 13, 2019

    Overcoming the budget challenge for cybersecurity spending

    1
    2
    PTP_logo-FC-reversed side by side.png
    PTP_logo-FC-reversed side by side.png

    info@ptechcyber.com

    (678) 341-0808

    linkedin-3-512.png
    youtube-3-512.png

    Atlanta, Georgia

    Pillar Technology Partners- All Rights Reserved

    Privacy Policy

    email.png
    phone.png
    pin.png