Blog

February 3, 2018
Penetration Testing Is a Reference Point Not a Strategy

Penetration Testing Is a Reference Point, Not a Strategy

[EDITORS NOTE]: This article originally appeared on Mike Hamilton’s monthly blog on CSO Online. Pen tests are valuable only if the results are properly translated into […]
January 24, 2018
Kraken a Cold One - 2/1/18 HH at Fado Irish Pub with Critical Informatics

[Happy Hour] Kraken a Cold One on 2/1/18

We’re ‘Kraken a Cold One’ on Feb.1 in Downtown Seattle! Join the team at Critical Informatics for a healthy dose of cybersecurity chitchat to wash down […]
January 23, 2018
5 InfoSec Requirements for GLBA Safeguards Rule

[INFOGRAPHIC] 5 InfoSec Requirements Under the GLBA Safeguards Rule

The Graham Leach Bliley Act (GLBA) is one of the central regulations for financial service companies. Among other things, GLBA requires covered entities to establish, implement, […]
January 11, 2018

Bonus [Video]: Mike Hamilton Discusses Your Favorite Infosec Trends for 2018

Because Critical Informatics Founder, President and CISO Mike Hamilton is basically always talking, we put him on a rigorous public engagement schedule for the the next […]
January 4, 2018
Critical Informatics Series A Expansion

Critical Informatics Announces an Additional $1.1 Million of Funding

January 4, 2018 – Seattle – Critical Informatics, a leader in cybersecurity Managed Detection and Response (MDR) services, announced today the close of additional $1.1 million […]
December 29, 2017
5 Building Blocks of an Effective InfoSec Program

[INFOGRAPHIC] The 5 Building Blocks of an Effective Cybersecurity Program

Building and maintaining customer trust is a fundamental aspect of running a successful business. In the past, doing so was a straightforward operation for honest business […]
December 27, 2017
Holiday IoT Gifts & Home Security

Holiday IoT Gifts and Home Security – What You Need to Know

Holiday gifts have come a long way since the days of Red Ryder BB guns and RC cars. Though the favorite childhood projectile launcher is still […]
December 21, 2017
4 Forces Accelerating InfoSec as a Competitive Differentiator

4 Forces Accelerating InfoSec as a Competitive Differentiator

[EDITORS NOTE]: This article originally appeared on Mike Hamilton’s monthly blog on CSO Online. After working in the security business for 25 years, I’ve seen my […]
December 19, 2017
Critical Informatics Forensics - 3 Methods to Preserve Evidence

3 Methods to Preserve Digital Evidence for Computer Forensics

Picture a scene from an episode of CSI or one of its many spinoffs, except Critical Informatics Forensics is at the scene.  Instead of dead things, […]

Want more cybersecurity information?

Sign Up for Our Daily Cyber Security News Blast


We may also occasionally send you information about Critical Informatics products and solutions; you can unsubscribe at anytime if desired.