CyberGuard

Keystrike joins WaterISAC

WaterISAC is the only security information clearing house for the water and wastewater sector. Serving hundreds of organizations worldwide, they ensure the sector sees, understands, and mitigates threats that put our common infrastructure at risk.

Keith Casey
June 3, 2025
CyberGuard

Volt Typhoon: The Ghost Inside Critical Infrastructure

Volt Typhoon has quietly moved through critical infrastructure networks, unseen and unchallenged. Unlike gangs that try for disruptions, Volt Typhoon takes a stealth-first approach.

Ymir Vigfusson
May 6, 2025
CyberGuard

The Unseen Storm: How China’s Typhoon APT Groups Are Setting the Stage for Cyberwarfare

For years, Chinese state-sponsored attackers have moved through the networks of the most critical industries—telecommunications, energy, defense, and government. Not to vandalize, not to ransom, but to wait.

Ymir Vigfusson
April 17, 2025
CyberGuard

Privileged Access Management in Modern Threat Landscapes: Exposing the Gaps Hackers Exploit

PAM helped us limit the scope and timing of access but - like in any arms race - our opposition learned and adapted to a new class of attacks.

Ymir Vigfusson
April 10, 2025
CyberGuard

Skjaldtorg: Iceland’s Cybersecurity Meetup

It’s time for an informal Icelandic forum for cybersecurity. We are pleased to announce Skjaldtorg: Iceland’s Cybersecurity Meetup, aimed at professionals responsible for cybersecurity within their organizations.

Ymir Vigfusson
August 26, 2024
CyberGuard

Hacking Humans – An MFA Challenge

Multi-factor authentication (MFA) has long been seen as a strong defense against unauthorized access.

Ymir Vigfusson
September 10, 2024
CyberGuard

How Lateral Movement Happens: A Step-by-Step Breakdown

Lateral movement is a stealthy and dangerous technique employed by cybercriminals to infiltrate and exploit secure networks.

Ymir Vigfusson
April 25, 2024
CyberGuard

What is MFA Fatigue?

MFA, or Multi-Factor Authentication, has become an integral part of our digital lives. It provides an added layer of security, requiring users to go through multiple steps to verify their identities.

Árni Thor Árnason
March 6, 2024
CyberGuard

What Do Virtually All Phishing Emails Have in Common?

Phishing emails have become a common and persistent threat in today’s digital world. While they may vary in their approach and techniques.

Ymir Vigfusson
February 27, 2024
CyberGuard

Deploy Keystrike in 20 Minutes

Try Keystrike in Your Environment for 30 Days