Core Blog Author

Justin Wray

As the Managing Director of Security Advisory at Core BTS, Justin helps organizations strategically maximize their security investments. With over 15+ years of industry experience, he has a unique perspective on the type of cybersecurity threats organizations face today.

Two IT security engineers managing security with Generative AI on computers.
Artificial Intelligence

Understanding Generative AI Security

Discover how AI is changing the way companies manage their security posture. Is your company’s security strategy keeping pace with the artificial intelligence (AI) revolution? If not, you might be setting yourself up for avoidable problems. With threats rapidly evolving, there’s never been a more critical time to be proactive about security. This article explores […]
Security

Your Guide to Ensuring Cloud Application Security

Cloud application security protects data via firewalls and encryption. Choosing the right provider, real-time monitoring, and tools like CASB and WAF are vital.
cybersecurity myth secure
Security

Cybersecurity Myth Busted: We’re Secure

There is no such thing as "secure vs insecure". That's not how security works. The adversaries only need to find the one risk you missed (or didn't know about).
cybersecurity myth ransom
Security

Cybersecurity Myth Busted: We’ll Just Pay the Ransom

Paying the ransom will not immediately stop the attack and restore your systems. You still have to remove the initial attack vectors and infections.
cybersecurity blog target
Security

Cybersecurity Myth Busted: We’re Not a Target

Since every organization has something valuable it must protect, the reality is that every organization is a potential target for extortion-related attacks.
cybersecurity myth tools
Security

Cybersecurity Myth Busted: Tools Are the Solution

Trying to secure an organization, data, or an environment does not revolve around tools. Instead, they must be managed with ongoing processes and procedures.
security staff blog
Security

Part-Time Staff Cannot Monitor and Manage Your Security

Security isn't 9-5. You have concerns, risks, and attacks 24/7/365. Adversaries work around the clock. Therefore, your security also needs constant attention.
Cybersecurity Myth Busted
Security

Cybersecurity Myth Busted: Security Can Be Managed by IT

IT focuses on building and running systems to enable business. But Security asks if the systems are secure, if they can break them, and how they can be misused.
Road in forest
Security

Beware of These 6 Common Gaps in Environmental Security

Of the hundreds of ways an environment or data can be breached, these are six of the most common gaps we have been seeing in client environments today.
Remote Work on Laptop
Security

Current and Future Challenges with Hybrid and Remote Work Models

Here are some current and anticipated future security risks we see with the hybrid work model, along with some high-level recommendations on remediation.
Featured Content
Subscribe to our Newsletter

Stay informed on the latest technology news and trends