top of page

Our Articles


Part 3—From Mental Health Clinics to Tribal Casinos: EPSS in Action Across Industries
See how Exploit Prediction Scoring System (EPSS) helped a mental health network and a tribal casino focus on real threats – providing lessons for every industry.
May 136 min read


Part 2—From Overwhelmed to Proactive: Integrating EPSS into Your Cybersecurity Strategy
Making Data-Driven Prioritization a Reality Adopting the Exploit Prediction Scoring System is not just about knowing what EPSS is – it’s...
May 98 min read


Part 1—Taming the Vulnerability Flood: How EPSS (Exploit Prediction Scoring System) Helps Cybersecurity Leaders Focus on Real Threats
A new longitudinal study of 300,000 CVEs shows that the Exploit Prediction Scoring System (EPSS) outperforms CVSS-only approaches in flagging vulnerabilities that are actually exploited in the wild. We break down key findings, what the charts reveal, and how security teams can prioritise patching with data-driven confidence.
Apr 297 min read


Part 5: Long-Term Cyber Resilience in Behavioral Health
Achieving long-term cyber resilience means going beyond quick fixes and embracing security as an ongoing strategic priority. Cyber...
Apr 186 min read


Part 4: Empowering Teams—Cyber Resilience for BCBAs, RBTs, and Clinicians
Even the best technology will fail if the people using it are not vigilant and informed. In behavioral health settings, every team...
Apr 115 min read


Part 3: Best Practices to Prevent Ransomware in Behavioral Health
Preventing a ransomware attack is far preferable to dealing with one. Behavioral health organizations can significantly reduce their risk...
Apr 56 min read


Part 2: Inside the Breach—Real-World Case Studies
Axis Health System’s website in late 2024 displayed a notice about the cyber incident, warning visitors that its primary care patient po
Mar 286 min read


Part 1: The Evolving Ransomware Threat Landscape
Five fast facts illustrate the scope of ransomware in healthcare. For example, healthcare organizations saw 50% more ransomware encryption e
Mar 197 min read
bottom of page