Blog

Why Collaborative Cybersecurity Is Critical for Modern Enterprises

Why Collaborative Cybersecurity Is Critical for Modern Enterprises 1600 1067 Andrew Heller
Discover why collaborative cybersecurity, including Purple Teaming, is critical for modern enterprises facing today’s evolving threats. read more

The Key Differences Between Red Teaming and Penetration Testing

The Key Differences Between Red Teaming and Penetration Testing 1600 1257 Andrew Heller
Learn the key differences between Red Teaming and Penetration Testing, and discover which approach is right for your organization. read more

How Purple Teaming Bridges the Gap Between Offense and Defense

How Purple Teaming Bridges the Gap Between Offense and Defense 1600 972 Andrew Heller
Learn how Purple Teaming bridges the gap between Red and Blue Teams, enhancing collaboration, detection, and response to modern threats. read more

What Is Red Team Testing and Why Your Business Needs It in 2025

What Is Red Team Testing and Why Your Business Needs It in 2025 1600 1071 Andrew Heller
Discover how Red Team Testing prepares your organization for sophisticated cyber threats in 2025. Learn why this advanced cybersecurity strategy is essential for your business. read more

Advancing Beyond Regulatory Standards: Lares; Perspective on New York's Hospital Cybersecurity Regulation

Advancing Beyond Regulatory Standards: Lares; Perspective on New York's Hospital Cybersecurity Regulation 1080 1080 Andrew Heller

Home Blog Schedule callAdvancing Beyond Regulatory StandardsLares’ Perspective on New York’s Hospital Cybersecurity RegulationDoes Compliance Stop Hackers?New York’s Section 405.46 hospital cybersecurity regulation is a landmark step toward safeguarding patient…

read more

Pentesting 101 Part 1: So, you need or want a Pentest

Pentesting 101 Part 1: So, you need or want a Pentest 1024 1024 Steve Spence

Home Blog ContactPentesting 101: Part 1So, you need or want a PentestThat day has finally come when you’ve been tasked with obtaining a penetration test for that project you’ve built…

read more

Ahold Delhaize Breached: Dissecting the Anatomy of (another) Grocery Chain Attack

Ahold Delhaize Breached: Dissecting the Anatomy of (another) Grocery Chain Attack 3072 1536 Andrew Heller
Ahold Delhaize, the grocery giant behind Stop & Shop, Giant Food, Food Lion, and Hannaford, suffered a cyberattack disrupting operations. Likely a ransomware attack, it crippled the company’s IT infrastructure, impacting pharmacies and payment systems. This highlights the growing trend of cyberattacks in the retail and grocery sectors. read more

Healthcare Cybersecurity: A Global Crisis That Hits Close to Home

Healthcare Cybersecurity: A Global Crisis That Hits Close to Home 1920 1080 Darryl MacLeod
As a Nova Scotian, the recent findings about vulnerabilities in our digital health network strike a personal chord. Cybersecurity in healthcare is no longer just a distant concern—it directly affects the quality and safety of care in our communities. What’s even more alarming is that this issue is not isolated to Nova Scotia. Healthcare systems around the world are facing increasing threats, putting patient safety, data privacy, and the continuity of essential services at risk. read more

Don't Let Ransomware Ruin Your Day

Don't Let Ransomware Ruin Your Day 1232 928 Mark Arnold

Ransomware remains an evolving threat, and being prepared with a solid incident response (IR) plan is crucial for any organization, especially financial institutions. When ransomware strikes, the clock starts ticking,…

read more

Selecting the Right vCISO: Key Criteria and Best Practices

Selecting the Right vCISO: Key Criteria and Best Practices 2048 1148 Andrew Hay

Choosing the right Virtual Chief Information Security Officer (vCISO) is a critical decision that can significantly impact an organization’s cybersecurity posture and overall success. This blog post will explore the…

read more

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2024 Lares, a Damovo Company | All rights reserved.

Error: Contact form not found.

Error: Contact form not found.

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.