Fostering Cyber Transparency with Richard Horne

Cyber Transparency: Shining a Light on Security

Jamie Cowper, VP of Marketing had the opportunity to sit down with Richard Horne, a distinguished member of the Noetic Advisory Board. Together, they discussed the challenges confronting organizations in the ever-evolving ...
Defining Cyber Resilience with Richard Horne

Cyber Resilience: Meeting the New Standard in Security

We sat down with Richard Horne, Noetic Advisory Board Member to explore the major issues that organizations face in the dynamic realm of cybersecurity. Richard, who spends much of his time strategizing ...

Cyber Risk Management: A Beginner’s Guide

With the emergence of new cybersecurity regulations like the SEC’s incident disclosure rules and the EU’s NIS2 Directive, much attention is directed towards understanding and complying with these new incident reporting requirements ...

Cisco VPN Hijacking Flaw In Secure Client Software Patched

In light of recent events, Cisco has released patches for two high-severity network vulnerabilities in its Secure Client. As per recent reports, vulnerabilities leading to the Cisco VPN hijacking flaw are being ...
illustration of robot holding a shield with text AI

How GenAI risks continue to impact security posture

Generative AI (GenAI) tools are transforming the way people work. They assist organizations in creating personalized content quickly. They also help streamline supply chains, automate decision-making, and facilitate agile business processes.  In ...
Machine Learning Classifier by Noetic Cyber

Tapping into the Potential of Generative AI in Cybersecurity

If ever there was a technology of the moment, it is generative AI. Thanks to the breakout success of OpenAI’s ChatGPT offering, the tech has achieved unprecedented global awareness—from the home user ...
illustration of shield surrounding browser window with 2024

Navigating the evolving browser security landscape in 2024

Web browsers shape the digital world as they connect us to information, transactions, and the world with every click, scroll, and search. With 75% of enterprise employees now spending the majority of ...
Maslows Hierarchy of Needs pyramid

Applying Maslow’s Hierarchy of Needs to Exposure Management

When I think about the broad security problems that Noetic is working to solve, they are typically associated with organizational cyber resilience. Security teams are not looking at Cyber Asset Attack Surface ...
illustration of robot in front of capitol building

How to Securely Enable Generative AI within the Public Sector

Generative artificial intelligence (AI) has captured the world’s collective attention. Millions of people use GenAI services everyday, and we’ve only just started to discover the impact it could have on our organizations ...
illustration of key unlocking browser window with text RaaS

RaaS kits will be a problem in 2024

In the first three quarters of 2023, the number of ransomware attacks increased by almost 70% compared to the first three quarters of 2022, according to a report from Apple.. Ransomware attacks ...

Secure Guardrails