Back to Main Navigation

PREDICT EXPLOITS

REDUCE COSTS

PREDICTION FOR THE CLOUD

ADVANCED CAPABILITIES

Back to Main Navigation

Resources

Predictive Threat Assessment Sign Up

Watch Now

PR1ORITY Product Demo
Back to Main Navigation

About CYR3CON

Come Join Us

CYR3CON is always looking for top talent to join our team.
View Openings
Back to Main Navigation

Take the next step to be in the know, now.

Complete the form and a member of the CYR3CON team will contact you shortly to discuss your cyber security needs.

Contact Form

Blog

Predicting Vulnerabilities Used by State-Sponsored Hackers

Paulo Shakarian on Oct 20, 2020 7:47:19 PM

 

How Vulnerability Management Teams Can Do More With Less

Paulo Shakarian on Oct 1, 2020 6:47:17 AM

 

Exposed Vulnerabilities on a DoD Server: Why Intelligence Should Have Driven Early Mitigation

Paulo Shakarian on Sep 9, 2020 6:30:00 AM

Last week it was reported that two RCE vulnerabilities were found to be exposed on a DoD server.  These were apparently exposed for about a year.  

Identify and Mitigate Systemic Cyber Threat

Paulo Shakarian on Jun 1, 2020 6:11:29 AM

 

For CISO’s responsible for a portfolio of companies – whether at a private equity firm, holding company, or even just a large firm with multiple business units, understanding cyber threats that..

Interview with Ed Amoroso of TAG Cyber

Paulo Shakarian on May 18, 2020 8:03:41 AM

 

Last year, I had the good fortune to sit down and talk with Ed Amoroso, CEO of TAG Cyber, a top-notch cybersecurity research firm. 

ML for Cybersecurity

Paulo Shakarian on May 13, 2020 9:19:28 AM

 

Ever since we started CYR3CON, we are continually surprised at the hype cycle surrounding the application of machine learning.

Breaking Down a Few Cybersecurity Myths

Rebecca Skubish on Mar 5, 2019 7:52:50 AM

 

Cybersecurity Crisis Management (CCM) Considerations - A 7-Step Strategy

Geoff Stoker on Feb 26, 2019 6:03:00 AM

 

Does your organization have a stated cybersecurity crisis management (CCM) strategy? If you said “no,” then by implication your actual strategy is to rely on your team’s experiential-based gut..

Cybersecurity Risk & Fundamentals

Geoff Stoker on Feb 11, 2019 6:05:00 AM

 

On September 7, 2017, Equifax announced it had suffered a cybersecurity incident resulting in the download of millions of consumers’ personal information from mid-May through late July. Last..

Hope and Hype for Cybersecurity AI

Geoff Stoker on Feb 6, 2019 6:36:00 AM

 

Modern Artificial Intelligence (AI) research began soon after the end of WW II perhaps best indicated by Alan Turing’s 1950 question, “Can machines think?” Since then, while devoted researchers..