Blog

Insights from Helios Security

Security guidance, industry updates, and best practices from our team of experts.

Showing: Tag: Risk close Clear filter
CLEARTEXT - Top Dos and Don'ts when building a cybersecurity program
CLEARTEXT 5 min read

CLEARTEXT - Top Dos and Don'ts when building a cybersecurity program

A Cybersecurity program is table stakes for any business where uptime or sensitive data impact revenue. Starting a cybersecurity program in 2026 isn't about chasing AI hype - it's about discerning prioritization to close the attack paths that still dominate: phishing (fueling 35-45% of ransomware), stolen credentials, and unpatched vulnerabilities. As an MSSP that's watched budgets vanish on tool sprawl while basics fail, here's the no-fluff guide to what works.

Feb 04, 2026 Matt Shafner
A Primer on Threat Modeling
Assessments 17 min read

A Primer on Threat Modeling

Threat modeling can be an overwhelming process to get started. There is a wealth of information out there on how to do it the “right way” and it can lead to decision paralysis. Here, we talk about a simple way to get started on your threat modeling journey to give you the necessary knowledge to choose your own “right way.”

Mar 11, 2025 Kevin Coddington
CISA FY23 Risk and Vulnerability Assessments
Assessments 13 min read

CISA FY23 Risk and Vulnerability Assessments

Every year, the federal Cybersecurity and Infrastructure Agency (CISA) conducts Risk and Vulnerability Assessments (RVAs) for the executive branch, high priority critical infrastructure operators and select state/local stakeholders.In September, CISA released a publication of the aggregate findings from their FY23 engagements. Within the findings, CISA mapped the most successful tactic in 11 of the 14 MITRE categories to help inform public and private companies of how to prioritize security controls in their environment.In this blog, we will walk through findings from each tactic and provide real-world recommendations for how to mitigate risk in your organization.

Jan 10, 2025 Matt Shafner

Ready to strengthen your security posture?

Our team is ready to help you identify vulnerabilities, build mature security programs, and protect what matters most.

Get Started arrow_forward