@cyberspan.bsky.social
Cold chain security is evolving! At the 2025 GCCA Convention, our Division Director of Training, Jessica Cunningham, MBA, PMP, highlighted how AI and hands-on training empower warehouse teams to spot threats early and respond confidently.
💡 Thank you, GCCA, for convening this important discussion.
💡 Thank you, GCCA, for convening this important discussion.
October 1, 2025 at 3:13 PM
Cold chain security is evolving! At the 2025 GCCA Convention, our Division Director of Training, Jessica Cunningham, MBA, PMP, highlighted how AI and hands-on training empower warehouse teams to spot threats early and respond confidently.
💡 Thank you, GCCA, for convening this important discussion.
💡 Thank you, GCCA, for convening this important discussion.
🚨 Social-engineering attacks like the Workday breach prove hackers exploit trust to spread fast.
CYBERSPAN® gives you the edge with actionable insights, full network visibility, & MITRE ATT&CK® mapping, stopping threats before they escalate.
Contact us today!
#CyberSecurity #CYBERSPAN
CYBERSPAN® gives you the edge with actionable insights, full network visibility, & MITRE ATT&CK® mapping, stopping threats before they escalate.
Contact us today!
#CyberSecurity #CYBERSPAN
Hackers target Workday in social engineering attack
Researchers cite increasing evidence of collaboration between Scattered Spider and the cybercrime group ShinyHunters in the campaign.
www.cybersecuritydive.com
August 26, 2025 at 7:36 PM
🚨 Social-engineering attacks like the Workday breach prove hackers exploit trust to spread fast.
CYBERSPAN® gives you the edge with actionable insights, full network visibility, & MITRE ATT&CK® mapping, stopping threats before they escalate.
Contact us today!
#CyberSecurity #CYBERSPAN
CYBERSPAN® gives you the edge with actionable insights, full network visibility, & MITRE ATT&CK® mapping, stopping threats before they escalate.
Contact us today!
#CyberSecurity #CYBERSPAN
Team building doesn’t have to stay indoors.
Our San Antonio team joined Broken Compass for a family-friendly hike, complete with a breathtaking view of the Korean monument, hand-crafted by artisans from Gwangju, Korea.
Culture + connection + community = 💙
#TeamBuilding #BrokenCompass
Our San Antonio team joined Broken Compass for a family-friendly hike, complete with a breathtaking view of the Korean monument, hand-crafted by artisans from Gwangju, Korea.
Culture + connection + community = 💙
#TeamBuilding #BrokenCompass
August 20, 2025 at 2:20 PM
Team building doesn’t have to stay indoors.
Our San Antonio team joined Broken Compass for a family-friendly hike, complete with a breathtaking view of the Korean monument, hand-crafted by artisans from Gwangju, Korea.
Culture + connection + community = 💙
#TeamBuilding #BrokenCompass
Our San Antonio team joined Broken Compass for a family-friendly hike, complete with a breathtaking view of the Korean monument, hand-crafted by artisans from Gwangju, Korea.
Culture + connection + community = 💙
#TeamBuilding #BrokenCompass
🛡 Two-Factor Tuesday
Enable multi-factor authentication (MFA) everywhere you can. One extra step can block 99% of account hacks.
Enable multi-factor authentication (MFA) everywhere you can. One extra step can block 99% of account hacks.
August 19, 2025 at 3:17 PM
🛡 Two-Factor Tuesday
Enable multi-factor authentication (MFA) everywhere you can. One extra step can block 99% of account hacks.
Enable multi-factor authentication (MFA) everywhere you can. One extra step can block 99% of account hacks.
Manufacturers rank cybersecurity as a top 3 risk, just behind inflation and economic growth.
CYBERSPAN® strengthens OT defenses with AI-driven threat detection, monitoring, and scalable protection.
🔗 cyberspan.us
#OTSecurity #CYBERSPAN
CYBERSPAN® strengthens OT defenses with AI-driven threat detection, monitoring, and scalable protection.
🔗 cyberspan.us
#OTSecurity #CYBERSPAN
Cybersecurity ranks among top three risks to manufacturing sector
Most companies are planning major AI investments to address growing threats to OT systems.
www.cybersecuritydive.com
August 18, 2025 at 8:29 PM
Manufacturers rank cybersecurity as a top 3 risk, just behind inflation and economic growth.
CYBERSPAN® strengthens OT defenses with AI-driven threat detection, monitoring, and scalable protection.
🔗 cyberspan.us
#OTSecurity #CYBERSPAN
CYBERSPAN® strengthens OT defenses with AI-driven threat detection, monitoring, and scalable protection.
🔗 cyberspan.us
#OTSecurity #CYBERSPAN
🔐 Malware Monday
Keep your software updated — outdated apps are prime targets for malware. Automatic updates are your best friend.
Keep your software updated — outdated apps are prime targets for malware. Automatic updates are your best friend.
August 18, 2025 at 2:06 PM
🔐 Malware Monday
Keep your software updated — outdated apps are prime targets for malware. Automatic updates are your best friend.
Keep your software updated — outdated apps are prime targets for malware. Automatic updates are your best friend.
What’s the Risk Wednesday
Leaving old accounts active after employees leave is a silent risk. Dormant credentials are an easy entry point for attackers.
Leaving old accounts active after employees leave is a silent risk. Dormant credentials are an easy entry point for attackers.
August 13, 2025 at 1:40 PM
What’s the Risk Wednesday
Leaving old accounts active after employees leave is a silent risk. Dormant credentials are an easy entry point for attackers.
Leaving old accounts active after employees leave is a silent risk. Dormant credentials are an easy entry point for attackers.
Cyber Tip Tuesday
💡 Tip: Limit user privileges. Grant employees access only to what they need, reduces the blast radius of any breach
💡 Tip: Limit user privileges. Grant employees access only to what they need, reduces the blast radius of any breach
August 12, 2025 at 2:43 PM
Cyber Tip Tuesday
💡 Tip: Limit user privileges. Grant employees access only to what they need, reduces the blast radius of any breach
💡 Tip: Limit user privileges. Grant employees access only to what they need, reduces the blast radius of any breach
📎 Fun Fact Friday
The word “bug” in tech?
It came from an actual moth found in a Harvard computer in 1947.
That moth is now on display at the Smithsonian.
#FunFactFriday #CyberHistory #TechTrivia #CYBERSPAN
cyberspan.us
The word “bug” in tech?
It came from an actual moth found in a Harvard computer in 1947.
That moth is now on display at the Smithsonian.
#FunFactFriday #CyberHistory #TechTrivia #CYBERSPAN
cyberspan.us
August 8, 2025 at 2:55 PM
📎 Fun Fact Friday
The word “bug” in tech?
It came from an actual moth found in a Harvard computer in 1947.
That moth is now on display at the Smithsonian.
#FunFactFriday #CyberHistory #TechTrivia #CYBERSPAN
cyberspan.us
The word “bug” in tech?
It came from an actual moth found in a Harvard computer in 1947.
That moth is now on display at the Smithsonian.
#FunFactFriday #CyberHistory #TechTrivia #CYBERSPAN
cyberspan.us
Most small businesses think they’re too small to target.
But 88% of ransomware-related breaches say otherwise.
CYBERSPAN® makes advanced cyber protection simple, fast, and affordable.
Learn more: www.cyberspan.us
#CyberSecurity #Ransomware #SmallBusiness #CYBERSPAN #NDR
But 88% of ransomware-related breaches say otherwise.
CYBERSPAN® makes advanced cyber protection simple, fast, and affordable.
Learn more: www.cyberspan.us
#CyberSecurity #Ransomware #SmallBusiness #CYBERSPAN #NDR
August 7, 2025 at 8:39 PM
Most small businesses think they’re too small to target.
But 88% of ransomware-related breaches say otherwise.
CYBERSPAN® makes advanced cyber protection simple, fast, and affordable.
Learn more: www.cyberspan.us
#CyberSecurity #Ransomware #SmallBusiness #CYBERSPAN #NDR
But 88% of ransomware-related breaches say otherwise.
CYBERSPAN® makes advanced cyber protection simple, fast, and affordable.
Learn more: www.cyberspan.us
#CyberSecurity #Ransomware #SmallBusiness #CYBERSPAN #NDR
🚨 St. Paul, MN declares state of emergency after cyberattack disables systems citywide.
The National Guard and FBI are now involved.
These attacks are hitting closer to home, and they’re not slowing down.
#CyberThreats #DigitalDisruption #CitySystems #CYBERSPAN
The National Guard and FBI are now involved.
These attacks are hitting closer to home, and they’re not slowing down.
#CyberThreats #DigitalDisruption #CitySystems #CYBERSPAN
MN National Guard deployed; St. Paul declares state of emergency in response to cyberattack
The city of St. Paul has declared a state of emergency after becoming the target of a cyberattack.
www.kare11.com
August 6, 2025 at 5:51 PM
🚨 St. Paul, MN declares state of emergency after cyberattack disables systems citywide.
The National Guard and FBI are now involved.
These attacks are hitting closer to home, and they’re not slowing down.
#CyberThreats #DigitalDisruption #CitySystems #CYBERSPAN
The National Guard and FBI are now involved.
These attacks are hitting closer to home, and they’re not slowing down.
#CyberThreats #DigitalDisruption #CitySystems #CYBERSPAN
IBM report highlights a growing threat: Shadow AI.
✔️ 1 in 5 breaches = insider-driven
✔️ Execs fear loss of AI control
✔️ Visibility is everything
That’s why tools like CYBERSPAN® exist: to catch what others overlook.
#ShadowAI #InsiderThreats #NetworkDetection #CYBERSPAN
✔️ 1 in 5 breaches = insider-driven
✔️ Execs fear loss of AI control
✔️ Visibility is everything
That’s why tools like CYBERSPAN® exist: to catch what others overlook.
#ShadowAI #InsiderThreats #NetworkDetection #CYBERSPAN
‘Shadow AI’ increases cost of data breaches, report finds
Companies are failing to protect their AI tools from compromise, often leading to more extensive data breaches, according to new data from IBM.
www.cybersecuritydive.com
August 5, 2025 at 8:38 PM
IBM report highlights a growing threat: Shadow AI.
✔️ 1 in 5 breaches = insider-driven
✔️ Execs fear loss of AI control
✔️ Visibility is everything
That’s why tools like CYBERSPAN® exist: to catch what others overlook.
#ShadowAI #InsiderThreats #NetworkDetection #CYBERSPAN
✔️ 1 in 5 breaches = insider-driven
✔️ Execs fear loss of AI control
✔️ Visibility is everything
That’s why tools like CYBERSPAN® exist: to catch what others overlook.
#ShadowAI #InsiderThreats #NetworkDetection #CYBERSPAN
CISA’s Joint Cyber Defense Collaborative is facing a contract lapse.
What that means:
• Delayed alerts to private sector
• Reduced coordination during active threats
If you can’t count on the alerts, you better count on your visibility.
#CISA #ThreatSharing #CyberPreparedness #CYBERSPAN
What that means:
• Delayed alerts to private sector
• Reduced coordination during active threats
If you can’t count on the alerts, you better count on your visibility.
#CISA #ThreatSharing #CyberPreparedness #CYBERSPAN
CISA’s Joint Cyber Defense Collaborative takes major personnel hit
JCDC’s troubles add to the woes of the already-depleted CISA, which could lose even more personnel as additional contracts with private companies expire.
www.cybersecuritydive.com
August 4, 2025 at 4:45 PM
CISA’s Joint Cyber Defense Collaborative is facing a contract lapse.
What that means:
• Delayed alerts to private sector
• Reduced coordination during active threats
If you can’t count on the alerts, you better count on your visibility.
#CISA #ThreatSharing #CyberPreparedness #CYBERSPAN
What that means:
• Delayed alerts to private sector
• Reduced coordination during active threats
If you can’t count on the alerts, you better count on your visibility.
#CISA #ThreatSharing #CyberPreparedness #CYBERSPAN
🤖 Curious how CYBERSPAN® works?
Our FAQ walks through everything from install methods to ROI. Built for small businesses without in-house teams, it’s cybersecurity made easy.
Start here: www.cyberspan.us
#CYBERSPAN #AI #CyberSecurity #SMBsecurity #AnomalyDetection
Our FAQ walks through everything from install methods to ROI. Built for small businesses without in-house teams, it’s cybersecurity made easy.
Start here: www.cyberspan.us
#CYBERSPAN #AI #CyberSecurity #SMBsecurity #AnomalyDetection
August 1, 2025 at 2:25 PM
🤖 Curious how CYBERSPAN® works?
Our FAQ walks through everything from install methods to ROI. Built for small businesses without in-house teams, it’s cybersecurity made easy.
Start here: www.cyberspan.us
#CYBERSPAN #AI #CyberSecurity #SMBsecurity #AnomalyDetection
Our FAQ walks through everything from install methods to ROI. Built for small businesses without in-house teams, it’s cybersecurity made easy.
Start here: www.cyberspan.us
#CYBERSPAN #AI #CyberSecurity #SMBsecurity #AnomalyDetection
Our San Antonio crew came together this weekend at Toyota Field to watch SAFC take on New Mexico United. ⚽
A great night of cyber minds, local soccer, and team bonding.
#TeamCulture #IntelliGenesis #CYBERSPAN #SAFC #CyberCareers
A great night of cyber minds, local soccer, and team bonding.
#TeamCulture #IntelliGenesis #CYBERSPAN #SAFC #CyberCareers
July 31, 2025 at 7:43 PM
Our San Antonio crew came together this weekend at Toyota Field to watch SAFC take on New Mexico United. ⚽
A great night of cyber minds, local soccer, and team bonding.
#TeamCulture #IntelliGenesis #CYBERSPAN #SAFC #CyberCareers
A great night of cyber minds, local soccer, and team bonding.
#TeamCulture #IntelliGenesis #CYBERSPAN #SAFC #CyberCareers
A wave of cyberattacks exploiting ToolShell and 4 CVEs has compromised 300+ organizations, including major U.S. government agencies.
🎯 Targets: DOE, DHS, HHS
💥 Attackers: Nation-state & ransomware groups
🧠 Risk: Machine Key theft enables persistent access
#SharePoint #Microsoft #CYBERSPAN
🎯 Targets: DOE, DHS, HHS
💥 Attackers: Nation-state & ransomware groups
🧠 Risk: Machine Key theft enables persistent access
#SharePoint #Microsoft #CYBERSPAN
What we know about the Microsoft SharePoint attacks
State-linked hackers and ransomware groups are targeting SharePoint customers across the globe.
www.cybersecuritydive.com
July 31, 2025 at 3:08 PM
A wave of cyberattacks exploiting ToolShell and 4 CVEs has compromised 300+ organizations, including major U.S. government agencies.
🎯 Targets: DOE, DHS, HHS
💥 Attackers: Nation-state & ransomware groups
🧠 Risk: Machine Key theft enables persistent access
#SharePoint #Microsoft #CYBERSPAN
🎯 Targets: DOE, DHS, HHS
💥 Attackers: Nation-state & ransomware groups
🧠 Risk: Machine Key theft enables persistent access
#SharePoint #Microsoft #CYBERSPAN
She logged in. So did her hacker.
Most attacks don’t break in, they log in.
CYBERSPAN® watches what happens next.
✅ Behavior-based threat detection
✅ Real-time alerts
✅ Simple, human-readable insights
What’s your first sign something’s off with a user login?
#CYBERSPAN #Cybersecurity
Most attacks don’t break in, they log in.
CYBERSPAN® watches what happens next.
✅ Behavior-based threat detection
✅ Real-time alerts
✅ Simple, human-readable insights
What’s your first sign something’s off with a user login?
#CYBERSPAN #Cybersecurity
July 18, 2025 at 6:16 PM
She logged in. So did her hacker.
Most attacks don’t break in, they log in.
CYBERSPAN® watches what happens next.
✅ Behavior-based threat detection
✅ Real-time alerts
✅ Simple, human-readable insights
What’s your first sign something’s off with a user login?
#CYBERSPAN #Cybersecurity
Most attacks don’t break in, they log in.
CYBERSPAN® watches what happens next.
✅ Behavior-based threat detection
✅ Real-time alerts
✅ Simple, human-readable insights
What’s your first sign something’s off with a user login?
#CYBERSPAN #Cybersecurity
New report: Iran-linked hackers focusing on U.S. transportation and manufacturing: not to shut things down fast, but to stay undetected and linger.
A slow drip of disruption can be just as damaging. Noticed how much quieter these campaigns are becoming?
www.cybersecuritydive.com/news/iranian...
A slow drip of disruption can be just as damaging. Noticed how much quieter these campaigns are becoming?
www.cybersecuritydive.com/news/iranian...
Iran-linked hackers target US transportation, manufacturing firms
U.S. authorities have been warning of potential state-linked or hacktivist threats since the country intervened in the Israel-Iran war.
www.cybersecuritydive.com
July 17, 2025 at 5:34 PM
New report: Iran-linked hackers focusing on U.S. transportation and manufacturing: not to shut things down fast, but to stay undetected and linger.
A slow drip of disruption can be just as damaging. Noticed how much quieter these campaigns are becoming?
www.cybersecuritydive.com/news/iranian...
A slow drip of disruption can be just as damaging. Noticed how much quieter these campaigns are becoming?
www.cybersecuritydive.com/news/iranian...
🚀 The CYBERSPAN® Intern Team has landed!
This summer, IG brought on 7 interns who are already diving deep into machine learning, threat modeling, and app development.
And don’t miss our Extern from Howard County leveling up our CYBERSPAN® training! Which projects would you want to explore?
This summer, IG brought on 7 interns who are already diving deep into machine learning, threat modeling, and app development.
And don’t miss our Extern from Howard County leveling up our CYBERSPAN® training! Which projects would you want to explore?
July 16, 2025 at 8:17 PM
🚀 The CYBERSPAN® Intern Team has landed!
This summer, IG brought on 7 interns who are already diving deep into machine learning, threat modeling, and app development.
And don’t miss our Extern from Howard County leveling up our CYBERSPAN® training! Which projects would you want to explore?
This summer, IG brought on 7 interns who are already diving deep into machine learning, threat modeling, and app development.
And don’t miss our Extern from Howard County leveling up our CYBERSPAN® training! Which projects would you want to explore?
The new NIST Zero Trust guide just dropped.
We wrote our own explainer on how to turn those principles into reality using CYBERSPAN® and network detection.
Written in-house. Practical. Actionable.
Check it out: intelligenesisllc.com/zero-trust-a...
#Cybersecurity #ZeroTrust #ThreatDetection
We wrote our own explainer on how to turn those principles into reality using CYBERSPAN® and network detection.
Written in-house. Practical. Actionable.
Check it out: intelligenesisllc.com/zero-trust-a...
#Cybersecurity #ZeroTrust #ThreatDetection
Why Network Detection & Response is a Key Component of Zero Trust Architecture - IntelliGenesis LLC
A Zero Trust Architecture (ZTA) assumes that threats can originate from anywhere—both inside and outside the network perimeter.
intelligenesisllc.com
July 15, 2025 at 6:27 PM
The new NIST Zero Trust guide just dropped.
We wrote our own explainer on how to turn those principles into reality using CYBERSPAN® and network detection.
Written in-house. Practical. Actionable.
Check it out: intelligenesisllc.com/zero-trust-a...
#Cybersecurity #ZeroTrust #ThreatDetection
We wrote our own explainer on how to turn those principles into reality using CYBERSPAN® and network detection.
Written in-house. Practical. Actionable.
Check it out: intelligenesisllc.com/zero-trust-a...
#Cybersecurity #ZeroTrust #ThreatDetection
U.S. federal agencies (CISA, FBI, NSA, DoD) have issued a warning that Iranian-linked cyber threats may target critical infrastructure soon.
Even without active attacks, the window for preventing disruption is now.
www.aha.org/news/headlin...
#CyberThreats #InfrastructureSecurity
Even without active attacks, the window for preventing disruption is now.
www.aha.org/news/headlin...
#CyberThreats #InfrastructureSecurity
Agencies release fact sheet on potential of malicious activity by Iranian cyber actors | AHA News
The Cybersecurity and Infrastructure Security Agency, FBI, Department of Defense Cyber Crime Center and the National Security Agency June 30 released a fact sheet on Iranian-affiliated cyber actors wh...
www.aha.org
July 14, 2025 at 8:33 PM
U.S. federal agencies (CISA, FBI, NSA, DoD) have issued a warning that Iranian-linked cyber threats may target critical infrastructure soon.
Even without active attacks, the window for preventing disruption is now.
www.aha.org/news/headlin...
#CyberThreats #InfrastructureSecurity
Even without active attacks, the window for preventing disruption is now.
www.aha.org/news/headlin...
#CyberThreats #InfrastructureSecurity
Attackers are moving faster than ever, and old security playbooks aren’t keeping up.
Behavior-based detection, identity vigilance, and surgical containment are the new essentials for cyber resilience.
#CyberResilience #ThreatIntel #IncidentResponse
Behavior-based detection, identity vigilance, and surgical containment are the new essentials for cyber resilience.
#CyberResilience #ThreatIntel #IncidentResponse
CISOs must rethink defense playbooks as cybercriminals move faster, smarter
Facing faster, stealthier intruders, CISOs are under pressure to modernize their cybersecurity strategies, toolsets, and tactics. From detection to post-mortem, here are key points of renewed emphasis...
www.csoonline.com
July 9, 2025 at 3:40 PM
Attackers are moving faster than ever, and old security playbooks aren’t keeping up.
Behavior-based detection, identity vigilance, and surgical containment are the new essentials for cyber resilience.
#CyberResilience #ThreatIntel #IncidentResponse
Behavior-based detection, identity vigilance, and surgical containment are the new essentials for cyber resilience.
#CyberResilience #ThreatIntel #IncidentResponse
We’re proud to announce IntelliGenesis CEO Angie Lienert will speak at Power Moves on July 17, sharing insights on scaling your business in the government contracting space.
📝 Lead the Climb
🔗 events.humanitix.com/power-moves
#GovCon #Leadership #WomenInBusiness #PowerMoves #TeamIG
📝 Lead the Climb
🔗 events.humanitix.com/power-moves
#GovCon #Leadership #WomenInBusiness #PowerMoves #TeamIG
July 8, 2025 at 8:28 PM
We’re proud to announce IntelliGenesis CEO Angie Lienert will speak at Power Moves on July 17, sharing insights on scaling your business in the government contracting space.
📝 Lead the Climb
🔗 events.humanitix.com/power-moves
#GovCon #Leadership #WomenInBusiness #PowerMoves #TeamIG
📝 Lead the Climb
🔗 events.humanitix.com/power-moves
#GovCon #Leadership #WomenInBusiness #PowerMoves #TeamIG
The U.S. is warning that Iranian-linked actors could escalate cyber activity targeting critical infrastructure.
The risks: DDoS, defacements, and opportunistic attacks on outdated systems.
A good moment for every organization to reassess cyber resilience.
#CyberThreats #Resilience
The risks: DDoS, defacements, and opportunistic attacks on outdated systems.
A good moment for every organization to reassess cyber resilience.
#CyberThreats #Resilience
US government warns of new Iran-linked cyber threats on critical infrastructure
Companies should disconnect operational technology from the internet and enforce strong protections for user accounts, a joint alert from CISA, the FBI, NSA and DoD said.
www.cybersecuritydive.com
July 7, 2025 at 5:01 PM
The U.S. is warning that Iranian-linked actors could escalate cyber activity targeting critical infrastructure.
The risks: DDoS, defacements, and opportunistic attacks on outdated systems.
A good moment for every organization to reassess cyber resilience.
#CyberThreats #Resilience
The risks: DDoS, defacements, and opportunistic attacks on outdated systems.
A good moment for every organization to reassess cyber resilience.
#CyberThreats #Resilience
Insurance firms are the latest target for Scattered Spider.
What’s scary?
Everything looks normal. Until it isn’t.
CYBERSPAN® uses anomaly detection to uncover movement no credential check will catch.
#ScatteredSpider #CyberInsurance #CredentialTheft #CYBERSPAN
What’s scary?
Everything looks normal. Until it isn’t.
CYBERSPAN® uses anomaly detection to uncover movement no credential check will catch.
#ScatteredSpider #CyberInsurance #CredentialTheft #CYBERSPAN
3 key takeaways from the Scattered Spider attacks on insurance firms
Scattered Spider recently pivoted from targeting worldwide retailers to U.S. based insurance firms, with no signs of slowing down. Learn about Scattered Spider TTPs and how to defend your organization...
www.bleepingcomputer.com
July 2, 2025 at 2:49 PM
Insurance firms are the latest target for Scattered Spider.
What’s scary?
Everything looks normal. Until it isn’t.
CYBERSPAN® uses anomaly detection to uncover movement no credential check will catch.
#ScatteredSpider #CyberInsurance #CredentialTheft #CYBERSPAN
What’s scary?
Everything looks normal. Until it isn’t.
CYBERSPAN® uses anomaly detection to uncover movement no credential check will catch.
#ScatteredSpider #CyberInsurance #CredentialTheft #CYBERSPAN