Insights
Why CBI
Services
Security Programs
Advanced Testing
Incident Response
Architecture & Integration
Managed Security
Product
Careers
Work With Us
Career Opportunities
Company
About Us
Leadership
Community
Reseller & Referral Partners
Events
Contact Us
Insights
Why CBI
Services
Security Programs
Advanced Testing
Incident Response
Architecture & Integration
Managed Security
Product
Careers
Work With Us
Career Opportunities
Company
About Us
Leadership
Community
Reseller & Referral Partners
Events
Contact Us
Sitemap
Pages
About Us
Advanced Testing
Architecture & Integration
Automotive
Career Opportunities
Community
Contact Us
Digital Forensics & Incident Response
Events
G2G Marketplace
Home
Incident Response
Insights
Leadership
Managed Security
Partners
Penetration Testing Scoping
Privacy Policy
Product
Ransomware
Search
Security Programs
Services
Strategic Services
Vertical – Financial
Vertical – Government
Why CBI
Why CBI – Obsessed About Cybersecurity
Why CBI – The Team You See
Why CBI – Today and Tomorrow
Work With Us
Why CBI – Boardroom Ready
Reseller & Referral Partners
Insights
Threat Intel Report | April 2022
CBI Is Now CBI, A Converge Company
Top 5 Pitfalls of EDR Programs
Defending Against Ransomware Attacks: 11 Best Practices for Success
Modern-Day Extortion
Threat Intel Report | March 2022
Petroleum Firm Shifts and Modernizes Its Active Directory Provisioning and Management
Security Alert | Security Impacts Ukrainian & Russian Conflict
CBI Ponemon Ransomware Report 2022
Threat Intel Report | February 2022
Cybersecurity and the Automotive Industry: A Management Perspective
Automotive Cybersecurity | Regulatory Pressures & Stressors
Security Alert Log4j Update #2
Dated 12.20.21
Aaron Mullinax Joins CBI as Vice President of Architecture and Integration
Security Alert Log4j Update #1 Dated 12.17.21
Log4j High-Risk Vulnerability
Financial Services Company Migrates On-Premises Workloads to the Cloud
Financial Organization Required Stronger Security Awareness Training & Vulnerability Management
Manufacturer Uncovers Source Code Management and VPN Vulnerabilities
Industrial Manufacturer Mitigates Ransomware Without Paying Attackers
Automotive Company Recovers From Ransomware & Strengthens Security Posture
Infographic: Ten Work-From-Home Cybersecurity Tips
Best Practices for Security Awareness Training Success
CBI Promotes Shaun Bertrand to Chief Services Officer
Accelerating Threat Detection & Response With XDR
Zero Trust:
What It Is and Why You Should Care
Cybersecurity in the Pandemic Era: A Look Back at Black Hat USA 2021
Protecting Data with SASE and DLP: 5 Keys to Success
Confronting Cybersecurity Challenges and Incident Response in the Cloud
Accelerating Your Zero Trust Journey
Kaseya Ransomware Attack: What You Need to Know
9 Keys to Incident Response Readiness
What is SASE, and Why Do You Need It?
What is SASE and Why Should You Care?
2021 Verizon DBIR Roundtable Discussion
The Good, The Bad and The Ugly: Lessons From AppSec Pentesting
Best Practices for Web Application Security
Hafnium: Lessons Learned and Recommendations from Incident Responders
Non-Negotiable Cybersecurity: New Regulations in the Auto Industry
Overcoming the Struggle to Operationalize Threat Intelligence
Security Alert | SAP Vulnerabilities Under Active Attack
2020 Cybersecurity in Review: A Red Team’s Perspective
CrowdStrike's 2021 Global Threat Report
Security Alert | Microsoft Exchange Vulnerability
CBI Named to the CRN MSP 500 List for 2021
Web Application Testing: Infiltration through Obfuscation
Web Application Testing: An Essential Component of Red Team Activities
Infographic: Ten Cybersecurity Priorities for 2021
Ten Cybersecurity Priorities for 2021
Infographic: Transform Your DLP Strategy to Guard Your Growing Datasphere
Security Alert | Healthcare Ransomware Attacks
Prioritize Web Application Testing In Your Security Program
Is your kiddo asking about hackers and internet bad guys?
Don’t Let Your Car Dealership Become a Target – Ensure Your Client Data is Compliant and Secure
Recap: C-Suite Perspectives – Executive Leadership During and After a Crisis
CBI Security Alert: 'SigRed' Windows DNS Server Remote Code Execution Vulnerability
Press Release: BullsEye Telecom Adds CBI Expertise to Security Offerings
On-Demand Panel: A More Secure Remote Access Model
CBI Security Alert: Ripple20
CBI Security Alert: EKANS
Keep Your Family Cybersecure
To Test or Not to Test—That is the Question
Six Ways to Improve Your Company’s Incident Response Strategy
Video: Remote Access Assessment Series: Volume 3 - End User Protection
Beyond IT / OT to Shared Risk-Based Decision-Making
CBI Sponsors OneMagnify Live to Support Henry Ford Hospital Nurses
Established Medical Device Manufacturer Revives Legacy IT to Protect It From Ever-Evolving Security Threats
Video: Remote Access Assessment Series: Volume 2 - Email Security
American Energy Company Overhauls its IT, Minimizes Complexity and Maximizes Overall Cybersecurity
Video: Remote Access Assessment Series: Volume 1 - EDR
A Proven Energy Industry Supplier Needed a New, Full-Scale Cybersecurity Program
End User Security: Six Steps to Success
Email Security: Best Practices for the Remote Workforce
Six Ways to Mature your EDR Program—from End to End
Securing Your DLP Future in the Unsecured Datasphere
A Large Financial Institution Needed More Than Traditional Penetration Testing
Cloud Security is Everyone’s Business
Regional Healthcare Network Enhances DLP Program to Improve Security Posture
Ready, Set, GO into the Boardroom and Win
Video: Remote Access Best Practices
Large Automotive Supplier Needed Expert Help Protecting Its Perimeter
Start Folding Now: CBI is Helping to Find a Coronavirus Cure - and So Can You
Mitigating the Cybersecurity Impact of the Coronavirus
Why Today’s Digital Forensics Can Feel Like the Wild West (and What to Do About It)
How to Secure Your Factories: Cybersecurity on the Production Floor
CBI Security Alert: Wawa Breach
CBI Security Alert: Microsoft Breach
End of Support for Windows 7, Server 2008 and SQL 2008 – What to do?
Recap: EDR Webinar with CrowdStrike
Preparing for 2020: Make Your New Year Cyber-secure
CBI Effect Podcast: Live from GrrCON 2019
How Anonymous is Cryptocurrency?
CBI Effect Podcast: Episode 7 - How to Build an Effective Cybersecurity Program
CBI Effect Podcast: Episode 6 - DLP with Forcepoint
Leveraging Data Discovery to Find Sensitive Data
CBI Security Alert: Restaurant Credit Card Breach
Video: CBI Patching and Hardening Assessments
BigFix: HCL Patch Tuesday Webinars
CBI Effect Podcast: Episode 5 - Patching and Hardening
CBI Security Alert: Internet Explorer Zero Day Exploit
Patching and Hardening – Does it matter?
Video: GrrCON 2019: Surfing and Security
How G2G Marketplace Helps Government Improve Cybersecurity
Dark Web Revealed and Explained
Emotet: Back from Summer Vacation
Infographic: Integrated Cyber Defense
CBI Effect Podcast: Episode 4 - Integrated Cyber Defense
6 Reasons Integrated Cyber Defense Will Be a Game-Changer
Is your organization seeing 2020?
CBI Promotes Chris Burrows to Chief Strategy Officer
CBI Effect Podcast: Episode 3 - Advanced EDR
Duck Hunting: Learning to spot and prevent malicious hardware attacks
Cybersecurity Visibility - Seeing is Protecting
Black Hat 2019: A Look Back
CBI Effect Podcast: Episode 2 - Vulnerability Management
CBI Security Alert: Capital One Data Breach
Video: New CBI Website Announcement
Infographic: MITRE ATT&CK Framework
FaceApp: Keep Calm and Manage Permissions
CBI Effect Podcast: Episode 1 - MITRE ATT&CK Framework
Choosing Your Cybersecurity Framework: Tips and Gotchas
Keep Your Kids Cybersecure
Data is Making Your Organization Smarter
How To Achieve IT/OT Convergence
CBI Security Alert: Evolution of BEC Scams
CBI's Chris Burrows Speaks at IoT Tech Connect 2019
BigFix Acquisition
CBI Security Alert: Microsoft Issues Patch to Secure Older Windows Versions from Wormable Attacks
CBI Sponsors 2019 Michigan InfraGard Annual Conference
CBI Security Alert: Lessons Learned from the Baltimore Ransomware Attack
Rowhammers And RAMBleeds – Evolving Data Threats
Operationalizing the MITRE ATT&CK Framework
Release McCracken! Building a Hash Cracking Rig at CBI
Testimonials
ATS - Alix Partners
AIM - JACK Entertainment
PenTest - United Wholesale Mortgage
Integration Services - LTU
Security Architecture - Northside Hospital
Incident Response - Nachi Robotics
Ransomware - Westmoreland Mining
General ATS - Kaufman Financial Group
General ATS - Nexteer Automotive
PenTesting - Northwestern MI College
Testimonial Categories
ATS General
Emerging Threats
Incident Response
Integration Services
Penetration Testing
Security Architecture
I Need To...