Anchor Technologies, Inc.
  • Solutions
    • Identify
    • Remediate
    • Monitor
  • Capabilities
    • Advisory
    • Integration
    • Technology Procurement
    • Risk Management
  • Insights
  • About
  • Contact
Select Page
  • Solutions
    • Identify
    • Remediate
    • Monitor
  • Capabilities
    • Advisory
    • Integration
    • Technology Procurement
    • Risk Management
  • Insights
  • About
  • Contact
The Vampiric, Voracious, and Probably Preventable, Vulnerability

The Vampiric, Voracious, and Probably Preventable, Vulnerability

by Peter Dietrich | Mar 13, 2018 | Blog

1:30 min read | As the pace of security breaches continues to accelerate, a common thread in most breaches is the exploitation of a technical vulnerability–in either the operating system or an application running on top of the operating system. Just in the past...
Best Solutions to Prevent Meltdown and Spectre Attacks

Best Solutions to Prevent Meltdown and Spectre Attacks

by Michele Dietrich | Jan 9, 2018 | Blog

1:00 min read All the cyber sphere is abuzz over the latest in world ending vulnerabilities Meltdown and Spectre. Truly the hype is impressive these past few weeks. But all kidding aside, this one is pretty serious or at least it may be...

Recent Posts

  • Technical Security Controls Review for Cyber Risk Reduction
  • eSentire Partner Anchor Technologies a Key Player in Growth and Success
  • The Metaverse Could Cost You Everything, If You Let It
  • Anchor Technologies, Inc. Launches New myCYPR Platform for Third-Party Risk Management

Categories

Tags

Administrative Privileges assessment authorized awareness training Check Point CIS control CMMC CMMC assessment CMMC assessor Compliance CRN Cyber Risk Management Cybersecurity Investment Incentive Cybersecurity Tax Credit Data Protection Data Recovery devices DoD CMMC Requirements Email Encryption Ethical Hack human security risk incident response incident response plan inside threat inventory Malware Meetup Network Device network port Network Segmentation password patching patch management penetration test phishing red team Security Control SMiShing software third-party risk management unauthorized Vendor risk management vulnerability vulnerability scanning

Solutions

Security Assessments

Compliance

Incident Response & Disaster Recovery

Comprehensive Security Management

Security Program Support

Virtual CISO (vCISO)

Capabilities

Advisory

Integration

Technology Procurement

Risk Management

myCYPR

Insights

Blog

News

Events

About

Our Story

Our Approach

Contact

info@anchortechnologies.com 

(410) 295-7601  |  (866) 841-0777

6315 Hillside Court, Suite J

Columbia, MD 21046

 

BREACH RESPONSE HOTLINE

breach@anchortechnologies.com 

(866) 841- 0777, option #8