How can we help you?
The Need For Audit Independence: Why MSSPs Shouldn’t Do Both Compliance Readiness and Audits
When evaluating vendors to build and audit your information security (infosec) program, there are many important questions to ask: Who exactly will be handling your…
Meet the Team: Vic DeBenedetto
Meet Vic! My name is Vic DeBenedetto, and I grew up in the Philly suburbs (Go Birds!). Growing up for me consisted of lots of…
Meet the Team: JT Carney
Meet JT! My name is JT Carney, and I grew up on Long Island, NY, for the majority of my life, before heading to Penn…
Meet the Team: Hunter Moreno
Meet Hunter! Hi! My name is Hunter Moreno, and I’m a cybersecurity analyst at Rhymetec. My path to where I am today wasn’t traditional. I wanted…
Meet the Team: Sam Brokaw
Meet Sam! I grew up in Charlotte, North Carolina, and later moved to Charleston, South Carolina for college, where I earned my Master of Science…
Meet the Team: Kyle Jones
Meet Kyle! Hi, I’m Kyle! I grew up in Dacula, Georgia which is about 45 minutes outside of Atlanta. My childhood mostly consisted of playing…
A Log Analysis Tutorial
Each year, companies and government institutions suffer data breaches without being able to identify how the breaches occurred or what data was compromised. Enter log…
ISO 42001 Checklist
This ISO 42001 checklist will walk you through the four phases of achieving certification. These steps are based on our security team’s process for helping…
How AI-Driven Cybersecurity Offers Both Promise and Peril for Enterprises
Artificial Intelligence (AI) is transforming multiple sectors, driving innovation and enhancing productivity and cybersecurity. The AI market is projected to rise from an estimated $86.9…
Generative AI Security Risks For Businesses: Practical Advice for the Concerned
You’ve just had your morning coffee, your Monday is off to a tiring start, and you log into a 9 am Zoom interview to vet…
ISO 42001 Compliance FAQ
If there’s one thing most people agree on in 2025, it’s that we need strong regulations around artificial intelligence (AI). Nearly 80% of Americans want…
Strengthening Business Defenses: A Guide to Cybersecurity Awareness Training
Businesses of all sizes handle sensitive data, including customer information, employee records, and proprietary information. In today’s world, there are millions of options for protecting…

