{"id":30731,"date":"2025-10-09T13:22:52","date_gmt":"2025-10-09T17:22:52","guid":{"rendered":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/"},"modified":"2025-10-14T11:00:03","modified_gmt":"2025-10-14T15:00:03","slug":"cybersecurity-awareness-month-meet-the-vendors-powering-our-protection","status":"publish","type":"post","link":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/","title":{"rendered":"Cybersecurity Awareness Month: Meet the Vendors Powering Our Protection"},"content":{"rendered":"\n<p class=\"has-bs-secondary-color has-text-color has-link-color has-h-3-font-size wp-elements-087f785071466de186ce6ea6016f97dc\">October marks Cybersecurity Awareness Month, a time dedicated to promoting safer digital practices and raising awareness about the ever-evolving threat landscape. At Climb Channel Solutions, we believe that strong cybersecurity isn\u2019t just a priority\u2014it\u2019s a partnership. That\u2019s why, throughout this month, we\u2019re shining a light on the incredible vendors who help us protect our data, systems, and people every single day.&nbsp;<\/p>\n\n\n\n<p>As part of our Cybersecurity Awareness Month celebration, we\u2019re excited to feature a series of blog posts from our trusted security vendors. Each post offers a unique perspective on today\u2019s most pressing cyber threats and the innovative solutions helping organizations stay protected. From threat intelligence and endpoint security to identity management and cloud protection, these vendors are on the front lines of cybersecurity\u2014and they\u2019ve got insights worth sharing. Dive into the content below to learn how each partner contributes to a safer, smarter digital environment.<\/p>\n\n\n            <section id=\"wmx-section-wrapper-06owq3j\" class=\"block block--section-wrapper \" style=\"background-color:var(u002du002dbs-light);\" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>\ud83d\udd10 <strong>Endpoint Security Blogs<\/strong><\/strong><\/h2>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n            <div  id=\"wmx-gallery-endpoint\" class=\"block block--gallery \" style=\"--card-count:4;\" data-wmx-wpb=\"gallery\" data-mobile=\"slider\" >\r\n                                    <div class=\"gallery\">\r\n                            <div class=\"gallery-inner --slider\">\r\n                <div class=\"swiper\">\r\n                    <div class=\"swiper-wrapper\"\r\n                         data-swiper-slides-per-view=\"4\"\r\n                         data-swiper-autoplay=\"false\"\r\n                         data-swiper-delay=\"3000\"\r\n                         data-swiper-speed=\"5\"\r\n                         data-swiper-pagination=\"false\"\r\n                         data-swiper-navigation=\"true\"\r\n                         data-swiper-loop=\"true\"\r\n                    >\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"200px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/svg\/Acronis-color-logo-01.svg\" alt=\"\" class=\"wp-image-27908\" style=\"width:200px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Endpoint Security Without the Performance Hit: Acronis + Intel AI-driven solution<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.acronis.com\/en\/blog\/posts\/endpoint-security-without-the-performance-hit-acronis-intel-ai-driven-solution\/\">Read More &gt;&gt;<\/a><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"188px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/svg\/jamf-logo-horizontal-small.svg\" alt=\"\" class=\"wp-image-33924\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">From Alert to Action: Jamf&#8217;s Integration with Google Security Operations Transforms Apple Threat Response<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.youtube.com\/watch?v=7cULltFiJMo\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><a href=\"https:\/\/www.youtube.com\/watch?v=mWxMUDf7TZw\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/strong><\/a><strong><a href=\"https:\/\/www.jamf.com\/blog\/jamf-integration-with-google-secops\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"186px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/svg\/SVGlogo-kaseya-color.svg\" alt=\"\" class=\"wp-image-32293\" style=\"width:186px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Why Ignoring AI for Endpoints is a Costly Mistake<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><a href=\"https:\/\/www.kaseya.com\/blog\/ai-endpoint-management-for-msps\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"188px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/11\/Automox-Logo.svg\" alt=\"\" class=\"wp-image-31168\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">The Shrinking Window for Vulnerability Exploitation<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><strong><a href=\"https:\/\/www.automox.com\/blog\/why-automated-patching-is-critical\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"413\" height=\"69\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/02\/Sophos-logo-website.png\" alt=\"\" class=\"wp-image-27449\" style=\"width:184px;height:auto\" srcset=\"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/02\/Sophos-logo-website.png 413w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/02\/Sophos-logo-website-300x50.png 300w\" sizes=\"auto, (max-width: 413px) 100vw, 413px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">What Happens When a Cybersecurity Company Gets Phished?<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><a href=\"https:\/\/news.sophos.com\/en-us\/2025\/09\/22\/what-happens-when-a-cybersecurity-company-gets-phished\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"64\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/03\/Trend-Micro-logo-website.png\" alt=\"\" class=\"wp-image-27755\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">How to Protect Yourself from Deepfakes<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><a href=\"https:\/\/news.trendmicro.com\/2024\/07\/29\/how-to-protect-from-deepfakes\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2025\/08\/Bitdefender-Blue-Logo-PRIMARY-1024x147.png\" alt=\"\" class=\"wp-image-33596\" style=\"width:174px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>MindManager Education Solution<\/strong><\/h6>\n\n\n\n<h6 class=\"wp-block-heading\">They Wear Our Faces: How Scammers are Using AI to Swindle American Families<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><strong><a href=\"https:\/\/www.bitdefender.com\/en-us\/blog\/hotforsecurity\/they-wear-our-faces-how-scammers-are-using-ai-to-swindle-american-families\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n<\/div>\r\n                <\/div>\r\n                                    <div class=\"swiper-button-next\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-right\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M6.776 1.553a.5.5 0 0 1 .671.223l3 6a.5.5 0 0 1 0 .448l-3 6a.5.5 0 1 1-.894-.448L9.44 8 6.553 2.224a.5.5 0 0 1 .223-.671z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                    <div class=\"swiper-button-prev\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-left\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M9.224 1.553a.5.5 0 0 1 .223.67L6.56 8l2.888 5.776a.5.5 0 1 1-.894.448l-3-6a.5.5 0 0 1 0-.448l3-6a.5.5 0 0 1 .67-.223z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n                <\/div>\r\n        \n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n\n            <section id=\"wmx-section-wrapper-06owq3j\" class=\"block block--section-wrapper \" style=\"background-color:var(u002du002dbs-gray-200);\" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>\ud83c\udf10 Network Security Blogs<\/strong><\/h2>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n            <div  id=\"wmx-gallery-network\" class=\"block block--gallery \" style=\"--card-count:4;\" data-wmx-wpb=\"gallery\" data-mobile=\"slider\" >\r\n                                    <div class=\"gallery\">\r\n                            <div class=\"gallery-inner --slider\">\r\n                <div class=\"swiper\">\r\n                    <div class=\"swiper-wrapper\"\r\n                         data-swiper-slides-per-view=\"4\"\r\n                         data-swiper-autoplay=\"false\"\r\n                         data-swiper-delay=\"3000\"\r\n                         data-swiper-speed=\"5\"\r\n                         data-swiper-pagination=\"false\"\r\n                         data-swiper-navigation=\"true\"\r\n                         data-swiper-loop=\"true\"\r\n                    >\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2025\/02\/Darktrace_Logo_LightBG_Black.png\" alt=\"\" class=\"wp-image-31635\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">One-Person Security Team, Enterprise-Wide Protection: A Utility Company\u2019s Darktrace Success Story<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.darktrace.com\/blog\/one-person-security-team-enterprise-wide-protection-a-utility-companys-darktrace-success-story\">Read More &gt;&gt;<\/a><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2025\/08\/ExtraHop-logo-rgb.png\" alt=\"\" class=\"wp-image-33603\" style=\"width:202px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">EDR-Freeze: The New Way Attackers are Getting into Your Network<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.youtube.com\/watch?v=7cULltFiJMo\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><a href=\"https:\/\/www.youtube.com\/watch?v=mWxMUDf7TZw\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/strong><\/a><strong><a href=\"https:\/\/www.extrahop.com\/blog\/edr-freeze-the-new-way-attackers-are-getting-into-your-network?utm_source=linkedin&amp;utm_medium=owned-social&amp;utm_campaign=fy25-organic-social-all-channels&amp;cid=7015Uf00000SrA9DIAV\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2025\/10\/l-garland-technology-0519.png\" alt=\"\" class=\"wp-image-34405\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Prevent Cybersecurity Blind Spots by Improving Network Visibility<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><a href=\"https:\/\/www.garlandtechnology.com\/blog\/prevent-cybersecurity-blind-spots-by-improving-network-visibility\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/10\/FireMon_Logo_ColorBlack_Horizonal.png\" alt=\"\" class=\"wp-image-30893\" style=\"width:176px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Wait, Firewalls Still Matter in a Zero Trust World?<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><strong><a href=\"https:\/\/www.firemon.com\/blog\/firewalls-in-a-zero-trust-world\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/07\/cato-logo.png\" alt=\"\" class=\"wp-image-30483\" style=\"width:176px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Unmanaged Doesn\u2019t Have to Mean Unprotected<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><a href=\"https:\/\/www.catonetworks.com\/blog\/unmanaged-doesnt-have-to-mean-unprotected\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n<\/div>\r\n                <\/div>\r\n                                    <div class=\"swiper-button-next\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-right\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M6.776 1.553a.5.5 0 0 1 .671.223l3 6a.5.5 0 0 1 0 .448l-3 6a.5.5 0 1 1-.894-.448L9.44 8 6.553 2.224a.5.5 0 0 1 .223-.671z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                    <div class=\"swiper-button-prev\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-left\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M9.224 1.553a.5.5 0 0 1 .223.67L6.56 8l2.888 5.776a.5.5 0 1 1-.894.448l-3-6a.5.5 0 0 1 0-.448l3-6a.5.5 0 0 1 .67-.223z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n                <\/div>\r\n        \n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n\n            <section id=\"wmx-section-wrapper-06owq3j\" class=\"block block--section-wrapper \" style=\"background-color:var(u002du002dbs-white);\" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>\u2601\ufe0f <strong>Cloud Security<\/strong><\/strong> <strong>Blogs<\/strong><\/h2>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n            <div  id=\"wmx-gallery-cloud\" class=\"block block--gallery \" style=\"--card-count:4;\" data-wmx-wpb=\"gallery\" data-mobile=\"slider\" >\r\n                                    <div class=\"gallery\">\r\n                            <div class=\"gallery-inner --slider\">\r\n                <div class=\"swiper\">\r\n                    <div class=\"swiper-wrapper\"\r\n                         data-swiper-slides-per-view=\"4\"\r\n                         data-swiper-autoplay=\"false\"\r\n                         data-swiper-delay=\"3000\"\r\n                         data-swiper-speed=\"5\"\r\n                         data-swiper-pagination=\"false\"\r\n                         data-swiper-navigation=\"true\"\r\n                         data-swiper-loop=\"true\"\r\n                    >\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"188px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/11\/Wasabi-Logo.svg\" alt=\"\" class=\"wp-image-31159\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Every Data Protection Strategy Should Be Cloud-Powered<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/wasabi.com\/blog\/data-protection\/every-data-protection-strategy-should-be-cloud-powered\">Read More &gt;&gt;<\/a><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"188px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/svg\/SumoLogic_Logo_SumoBlue_CMYK.svg\" alt=\"\" class=\"wp-image-28131\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Ten Modern SIEM Use Cases at Cloud Scale<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.youtube.com\/watch?v=7cULltFiJMo\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><a href=\"https:\/\/www.youtube.com\/watch?v=mWxMUDf7TZw\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/strong><\/a><strong><a href=\"https:\/\/www.sumologic.com\/blog\/why-modern-siem\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/11\/SCALITY_Logo_RGB_Color-blac-horizontal.png\" alt=\"\" class=\"wp-image-31148\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Unbreakable Cloud Storage: Your Defense Against Ransomware and Other Data Threats<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><a href=\"https:\/\/www.solved.scality.com\/unbreakable-cloud-storage-for-data-centers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2025\/08\/Egnyte-Logo-NavyTeal-1.png\" alt=\"\" class=\"wp-image-33585\" style=\"width:176px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Protect Your SMB with These 8 Data Governance Best Practices<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><strong><a href=\"https:\/\/www.egnyte.com\/blog\/post\/8-data-protection-best-practices-for-data-backup-day-and-everyday\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"176px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/11\/SUSE_Logo-hor_L_Green-pos_sRGB.svg\" alt=\"\" class=\"wp-image-31135\" style=\"width:176px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Combining Confidential Computing with Hardware Acceleration to Enhance End-to-End Value\/Benefit<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><a href=\"https:\/\/www.suse.com\/c\/combining-confidential-computing-with-hardware-acceleration-to-enhance-end-to-end-value-benefit\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n<\/div>\r\n                <\/div>\r\n                                    <div class=\"swiper-button-next\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-right\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M6.776 1.553a.5.5 0 0 1 .671.223l3 6a.5.5 0 0 1 0 .448l-3 6a.5.5 0 1 1-.894-.448L9.44 8 6.553 2.224a.5.5 0 0 1 .223-.671z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                    <div class=\"swiper-button-prev\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-left\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M9.224 1.553a.5.5 0 0 1 .223.67L6.56 8l2.888 5.776a.5.5 0 1 1-.894.448l-3-6a.5.5 0 0 1 0-.448l3-6a.5.5 0 0 1 .67-.223z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n                <\/div>\r\n        \n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n\n            <section id=\"wmx-section-wrapper-06owq3j\" class=\"block block--section-wrapper \" style=\"background-color:var(u002du002dbs-gray-200);\" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">\ud83e\udde0 <strong>Threat Detection &amp; Response<\/strong> <strong>Blogs<\/strong><\/h2>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n            <div  id=\"wmx-gallery-threat\" class=\"block block--gallery \" style=\"--card-count:4;\" data-wmx-wpb=\"gallery\" data-mobile=\"slider\" >\r\n                                    <div class=\"gallery\">\r\n                            <div class=\"gallery-inner --slider\">\r\n                <div class=\"swiper\">\r\n                    <div class=\"swiper-wrapper\"\r\n                         data-swiper-slides-per-view=\"4\"\r\n                         data-swiper-autoplay=\"false\"\r\n                         data-swiper-delay=\"3000\"\r\n                         data-swiper-speed=\"5\"\r\n                         data-swiper-pagination=\"false\"\r\n                         data-swiper-navigation=\"true\"\r\n                         data-swiper-loop=\"true\"\r\n                    >\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/10\/ironscales-logo.png\" alt=\"\" class=\"wp-image-30896\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">When One Phish Poisons the Pipeline: Supply Chain Phishing on the Rise<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/ironscales.com\/blog\/when-one-phish-poisons-the-pipeline-supply-chain-phishing-on-the-rise\">Read More &gt;&gt;<\/a><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/09\/Flashpoint_Logo_Simple2Color.png\" alt=\"\" class=\"wp-image-30721\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">FUSE 2025: Operationalizing Flashpoint Intelligence to Thwart Rising Threats<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.youtube.com\/watch?v=7cULltFiJMo\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><a href=\"https:\/\/www.youtube.com\/watch?v=mWxMUDf7TZw\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/strong><\/a><strong><a href=\"https:\/\/flashpoint.io\/blog\/fuse-2025-security-leaders-operationalizing-flashpoint-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"188px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/11\/DNSFilter-Logo.svg\" alt=\"\" class=\"wp-image-31151\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">What DNS Needs to Be When It Grows Up: Protective<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><a href=\"https:\/\/www.dnsfilter.com\/blog\/what-dns-needs-to-be-when-it-grows-up\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2025\/06\/Bugcrowd-logo-01.png\" alt=\"\" class=\"wp-image-32505\" style=\"width:176px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Security Threats Facing AI Systems<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><strong><a href=\"https:\/\/www.bugcrowd.com\/blog\/owasp-top-10-security-threats-facing-ai-systems\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2025\/04\/ThreatDown_Horizontal_Navy.png\" alt=\"\" class=\"wp-image-32029\" style=\"width:176px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">How NIST Is Going to Secure AI<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><a href=\"https:\/\/www.threatdown.com\/blog\/how-nist-is-going-to-secure-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"176px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/svg\/forcepoint.svg\" alt=\"\" class=\"wp-image-32145\" style=\"width:176px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Shadow AI Risks and How to Stop Them<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><a href=\"https:\/\/www.forcepoint.com\/blog\/x-labs\/shadow-ai-risks-detection-prevention\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"499\" height=\"81\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2023\/12\/LogicGate-Logo.png\" alt=\"\" class=\"wp-image-25000\" style=\"width:176px;height:auto\" srcset=\"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2023\/12\/LogicGate-Logo.png 499w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2023\/12\/LogicGate-Logo-300x49.png 300w\" sizes=\"auto, (max-width: 499px) 100vw, 499px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">What Is Shadow AI? Identifying and Mitigating Its Risks<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><a href=\"https:\/\/www.logicgate.com\/blog\/what-is-shadow-ai-identifying-and-mitigating-its-security-risks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n<\/div>\r\n                <\/div>\r\n                                    <div class=\"swiper-button-next\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-right\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M6.776 1.553a.5.5 0 0 1 .671.223l3 6a.5.5 0 0 1 0 .448l-3 6a.5.5 0 1 1-.894-.448L9.44 8 6.553 2.224a.5.5 0 0 1 .223-.671z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                    <div class=\"swiper-button-prev\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-left\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M9.224 1.553a.5.5 0 0 1 .223.67L6.56 8l2.888 5.776a.5.5 0 1 1-.894.448l-3-6a.5.5 0 0 1 0-.448l3-6a.5.5 0 0 1 .67-.223z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n                <\/div>\r\n        \n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n\n            <section id=\"wmx-section-wrapper-06owq3j\" class=\"block block--section-wrapper \" style=\"background-color:var(u002du002dbs-white);\" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">\ud83d\udd12 <strong>Data Protection &amp; Privacy<\/strong> <strong>Blogs<\/strong><\/h2>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n            <div  id=\"wmx-gallery-data\" class=\"block block--gallery \" style=\"--card-count:4;\" data-wmx-wpb=\"gallery\" data-mobile=\"slider\" >\r\n                                    <div class=\"gallery\">\r\n                            <div class=\"gallery-inner --slider\">\r\n                <div class=\"swiper\">\r\n                    <div class=\"swiper-wrapper\"\r\n                         data-swiper-slides-per-view=\"4\"\r\n                         data-swiper-autoplay=\"false\"\r\n                         data-swiper-delay=\"3000\"\r\n                         data-swiper-speed=\"5\"\r\n                         data-swiper-pagination=\"false\"\r\n                         data-swiper-navigation=\"true\"\r\n                         data-swiper-loop=\"true\"\r\n                    >\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/09\/arcserve-logo-black-600.png\" alt=\"\" class=\"wp-image-30738\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Comprehensive Defense Against Ransomware with Arcserve: Your Guide to Immutable Backup Protection<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.arcserve.com\/blog\/comprehensive-defense-against-ransomware-arcserve-your-guide-immutable-backup-protection?Recent_Lead_Source=Social%20Media&amp;Recent_Lead_Source_Detail=LinkedIn&amp;programmembersource=Social%20Media&amp;programmembersourcedetail=LinkedIn\">Read More &gt;&gt;<\/a><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"186px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/svg\/paessler-logo-horizontal-small.svg\" alt=\"\" class=\"wp-image-33934\" style=\"width:186px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Data Break Monitoring: Protecting Personal Data from the Dark Web<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.youtube.com\/watch?v=7cULltFiJMo\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><a href=\"https:\/\/www.youtube.com\/watch?v=mWxMUDf7TZw\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/strong><\/a><strong><a href=\"https:\/\/blog.paessler.com\/data-breach-monitoring-how-to-protect-your-personal-data-from-the-dark-web\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2025\/08\/TeamViewer_Logo_CarbonBlue_CMYK_C-scaled.png\" alt=\"\" class=\"wp-image-33601\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Rethinking Digital Workplace Security<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><a href=\"https:\/\/www.teamviewer.com\/en-us\/insights\/rethinking-digital-workplace-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/03\/TXOne-520-270-blue-red-logo.png\" alt=\"\" class=\"wp-image-30262\" style=\"width:176px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Supply Chain Cybersecurity: Vulnerabilities and Strategies<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><strong><a href=\"https:\/\/www.txone.com\/blog\/supply-chain-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/09\/kiteworks-primary-color-logo.png\" alt=\"\" class=\"wp-image-30723\" style=\"width:176px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Email Security in 2025: Critical Findings Show Your Industry and Location Determine Your Risk<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><strong><a href=\"https:\/\/www.kiteworks.com\/cybersecurity-risk-management\/email-security-risk-industry-location-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"5906\" height=\"1042\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/03\/n-able-logo-website.png\" alt=\"\" class=\"wp-image-28305\" style=\"width:176px;height:auto\" srcset=\"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/n-able-logo-website.png 5906w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/n-able-logo-website-300x53.png 300w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/n-able-logo-website-1024x181.png 1024w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/n-able-logo-website-768x135.png 768w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/n-able-logo-website-1536x271.png 1536w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/n-able-logo-website-2048x361.png 2048w\" sizes=\"auto, (max-width: 5906px) 100vw, 5906px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Backups Are Under Attack: How Anomaly Detection Shields Your Last Line of Defense<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><strong><a href=\"https:\/\/www.n-able.com\/blog\/backups-are-under-attack-how-anomaly-detection-shields-your-last-line-of-defense\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n<\/div>\r\n                <\/div>\r\n                                    <div class=\"swiper-button-next\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-right\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M6.776 1.553a.5.5 0 0 1 .671.223l3 6a.5.5 0 0 1 0 .448l-3 6a.5.5 0 1 1-.894-.448L9.44 8 6.553 2.224a.5.5 0 0 1 .223-.671z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                    <div class=\"swiper-button-prev\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-left\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M9.224 1.553a.5.5 0 0 1 .223.67L6.56 8l2.888 5.776a.5.5 0 1 1-.894.448l-3-6a.5.5 0 0 1 0-.448l3-6a.5.5 0 0 1 .67-.223z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n                <\/div>\r\n        \n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n\n\n\n\n\n            <section id=\"wmx-section-wrapper-06owq3j\" class=\"block block--section-wrapper \" style=\"background-color:var(u002du002dbs-gray-200);\" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">\ud83d\udcda <strong>Security Awareness &amp; Training<\/strong> <strong>Blogs<\/strong><\/h2>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n            <div  id=\"wmx-gallery-security\" class=\"block block--gallery \" style=\"--card-count:4;\" data-wmx-wpb=\"gallery\" data-mobile=\"slider\" >\r\n                                    <div class=\"gallery\">\r\n                <div class=\"gallery-inner --grid d-none d-md-flex\">\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/10\/fortra-logo-forest-green.png\" alt=\"\" class=\"wp-image-30895\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">What National Cybersecurity Awareness Month Means in 2025<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><a href=\"https:\/\/www.fortra.com\/blog\/national-cybersecurity-awareness-month-means-year?code=CMP-0000001807&amp;ls=100000000&amp;utm_source=linkedin&amp;utm_medium=social\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"2500\" height=\"1334\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/02\/SolarWinds-logo.png\" alt=\"\" class=\"wp-image-27060\" style=\"width:188px;height:auto\" srcset=\"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/02\/SolarWinds-logo.png 2500w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/02\/SolarWinds-logo-300x160.png 300w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/02\/SolarWinds-logo-1024x546.png 1024w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/02\/SolarWinds-logo-768x410.png 768w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/02\/SolarWinds-logo-1536x820.png 1536w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/02\/SolarWinds-logo-2048x1093.png 2048w\" sizes=\"auto, (max-width: 2500px) 100vw, 2500px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">How to Talk to Your Kids and Family About Online Security<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.solarwinds.com\/blog\/hey-insert-family-friend-name-here-lets-talk-about-online-security\">Read More &gt;&gt;<\/a><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"188px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/svg\/OffSec-Color.svg\" alt=\"\" class=\"wp-image-28099\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">What Is Ethical Hacking?<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.youtube.com\/watch?v=7cULltFiJMo\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><a href=\"https:\/\/www.youtube.com\/watch?v=mWxMUDf7TZw\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/strong><\/a><strong><a href=\"https:\/\/www.offsec.com\/blog\/what-is-ethical-hacking\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1250\" height=\"374\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/03\/Opentext-logo.png\" alt=\"\" class=\"wp-image-27961\" style=\"width:176px;height:auto\" srcset=\"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/Opentext-logo.png 1250w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/Opentext-logo-300x90.png 300w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/Opentext-logo-1024x306.png 1024w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/Opentext-logo-768x230.png 768w\" sizes=\"auto, (max-width: 1250px) 100vw, 1250px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Cybersecurity Awareness Month: Identify, AI, and the Future of Your Cyber Defense<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><strong><a href=\"https:\/\/blogs.opentext.com\/cybersecurity-awareness-month-identity-ai-and-the-future-of-your-cyber-defense\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n<\/div>            <div class=\"gallery-inner --slider d-md-none\">\r\n                <div class=\"swiper\">\r\n                    <div class=\"swiper-wrapper\"\r\n                         data-swiper-slides-per-view=\"4\"\r\n                         data-swiper-autoplay=\"false\"\r\n                         data-swiper-delay=\"\"\r\n                         data-swiper-speed=\"\"\r\n                         data-swiper-pagination=\"false\"\r\n                         data-swiper-navigation=\"false\"\r\n                         data-swiper-loop=\"false\"\r\n                    ><\/div>\r\n                <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n                <\/div>\r\n        \n\n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        \n\n            <section id=\"wmx-section-wrapper-06owq3j\" class=\"block block--section-wrapper \" style=\"background-color:var(u002du002dbs-white);\" data-wmx-wpb=\"section-wrapper\" >\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                        <div class=\"col-12\">\r\n                                                                <div class=\"inner-wrapper\">\r\n\r\n        \n\n<div style=\"height:56px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">\u2696\ufe0f <strong>Compliance &amp; Risk Management<\/strong> <strong>Blogs<\/strong><\/h2>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n            <div  id=\"wmx-gallery-compliance\" class=\"block block--gallery \" style=\"--card-count:4;\" data-wmx-wpb=\"gallery\" data-mobile=\"slider\" >\r\n                                    <div class=\"gallery\">\r\n                            <div class=\"gallery-inner --slider\">\r\n                <div class=\"swiper\">\r\n                    <div class=\"swiper-wrapper\"\r\n                         data-swiper-slides-per-view=\"4\"\r\n                         data-swiper-autoplay=\"false\"\r\n                         data-swiper-delay=\"3000\"\r\n                         data-swiper-speed=\"5\"\r\n                         data-swiper-pagination=\"false\"\r\n                         data-swiper-navigation=\"true\"\r\n                         data-swiper-loop=\"true\"\r\n                    >\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"188px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/svg\/a-lign_logo_primary_black.svg\" alt=\"\" class=\"wp-image-31630\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">What Is FedRAMP? Complete Guide to FedRAMP Authorization<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.a-lign.com\/articles\/what-is-fedramp120812312\">Read More &gt;&gt;<\/a><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"174px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/svg\/NEW_Invicti_logo-purple.svg\" alt=\"\" class=\"wp-image-27863\" style=\"width:174px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">AppSec in the Age of AI-Powered Attacks: Are Your Apps Ready?<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><a href=\"https:\/\/www.youtube.com\/watch?v=7cULltFiJMo\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><a href=\"https:\/\/www.youtube.com\/watch?v=mWxMUDf7TZw\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/strong><\/a><strong><a href=\"https:\/\/www.invicti.com\/blog\/web-security\/appsec-in-the-age-of-ai-powered-attacks-cisos-corner\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" width=\"188px\" height=\"auto\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/svg\/securitycompass-color-logo.svg\" alt=\"\" class=\"wp-image-28121\" style=\"width:188px;height:auto\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">API Security Best Practices<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><a href=\"https:\/\/www.securitycompass.com\/blog\/best-api-security-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"7918\" height=\"1860\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/03\/Flexera-logo-website.png\" alt=\"\" class=\"wp-image-27996\" style=\"width:176px;height:auto\" srcset=\"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/Flexera-logo-website.png 7918w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/Flexera-logo-website-300x70.png 300w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/Flexera-logo-website-1024x241.png 1024w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/Flexera-logo-website-768x180.png 768w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/Flexera-logo-website-1536x361.png 1536w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/Flexera-logo-website-2048x481.png 2048w\" sizes=\"auto, (max-width: 7918px) 100vw, 7918px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">Decoding Likely Exploited Vulnerabilities (LEV) &#8211; A New Metric from NIST<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><strong><a href=\"https:\/\/www.flexera.com\/blog\/security\/decoding-likely-exploited-vulnerabilities-lev-a-new-metric-from-nist\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n\n\r\n\t<div class=\"block--gallery-card block--gallery-card \"   data-wmx-wpb=\"gallery-card\" data-bs-theme=\"light\" data-slide=\"true\" >\r\n\t\t<div class=\"card p-3 border\" data-wmx-stretch-link=\"true\" >\r\n\t\t\t\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"460\" height=\"340\" src=\"https:\/\/www.climbcs.com\/wp-content\/uploads\/2024\/03\/vendor-logo-sonatype.png\" alt=\"\" class=\"wp-image-28904\" style=\"width:176px;height:auto\" srcset=\"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/vendor-logo-sonatype.png 460w, https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/03\/vendor-logo-sonatype-300x222.png 300w\" sizes=\"auto, (max-width: 460px) 100vw, 460px\" \/><\/figure>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h6 class=\"wp-block-heading\">How AI and Vibe Coding Are Changing the Rules of Software Security<\/h6>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer  flex-fill\"><\/div>\n\n\n\n<p><strong><strong><strong><strong><a href=\"https:\/\/www.sonatype.com\/blog\/how-ai-and-vibe-coding-are-changing-the-rules-of-software-security\" target=\"_blank\" rel=\"noreferrer noopener\">Read More &gt;&gt;<\/a><\/strong><\/strong><\/strong><\/strong><\/p>\n\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t\n<\/div>\r\n                <\/div>\r\n                                    <div class=\"swiper-button-next\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-right\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M6.776 1.553a.5.5 0 0 1 .671.223l3 6a.5.5 0 0 1 0 .448l-3 6a.5.5 0 1 1-.894-.448L9.44 8 6.553 2.224a.5.5 0 0 1 .223-.671z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                    <div class=\"swiper-button-prev\">\r\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" fill=\"currentColor\" class=\"bi bi-chevron-compact-left\" viewBox=\"0 0 16 16\">\r\n                            <path fill-rule=\"evenodd\" d=\"M9.224 1.553a.5.5 0 0 1 .223.67L6.56 8l2.888 5.776a.5.5 0 1 1-.894.448l-3-6a.5.5 0 0 1 0-.448l3-6a.5.5 0 0 1 .67-.223z\"\/>\r\n                        <\/svg>\r\n                    <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n                <\/div>\r\n        \n\r\n    <\/div>\r\n\r\n                            <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/section>\r\n        ","protected":false},"excerpt":{"rendered":"<p>October marks Cybersecurity Awareness Month, a time dedicated to promoting safer digital practices and raising awareness about the ever-evolving threat&#8230;<\/p>\n","protected":false},"author":70,"featured_media":29983,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8],"tags":[],"resource_type":[299],"solution":[],"vendor_name":[],"class_list":["post-30731","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","resource_type-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Awareness Month: Meet the Vendors Powering Our Protection - Climb Channel Solutions CA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Awareness Month: Meet the Vendors Powering Our Protection - Climb Channel Solutions CA\" \/>\n<meta property=\"og:description\" content=\"October marks Cybersecurity Awareness Month, a time dedicated to promoting safer digital practices and raising awareness about the ever-evolving threat...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Climb Channel Solutions CA\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-09T17:22:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-14T15:00:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/10\/cybersecurity-month.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"jenmorrison\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/\"},\"author\":{\"name\":\"jenmorrison\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/#\\\/schema\\\/person\\\/7f3d12819a5feb07091e28ec51f1e42e\"},\"headline\":\"Cybersecurity Awareness Month: Meet the Vendors Powering Our Protection\",\"datePublished\":\"2025-10-09T17:22:52+00:00\",\"dateModified\":\"2025-10-14T15:00:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/\"},\"wordCount\":709,\"image\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2024\\\/10\\\/cybersecurity-month.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/\",\"url\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/\",\"name\":\"Cybersecurity Awareness Month: Meet the Vendors Powering Our Protection - Climb Channel Solutions CA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2024\\\/10\\\/cybersecurity-month.jpg\",\"datePublished\":\"2025-10-09T17:22:52+00:00\",\"dateModified\":\"2025-10-14T15:00:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/#\\\/schema\\\/person\\\/7f3d12819a5feb07091e28ec51f1e42e\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2024\\\/10\\\/cybersecurity-month.jpg\",\"contentUrl\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2024\\\/10\\\/cybersecurity-month.jpg\",\"width\":600,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Awareness Month: Meet the Vendors Powering Our Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/#website\",\"url\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/\",\"name\":\"Climb Channel Solutions CA\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/#\\\/schema\\\/person\\\/7f3d12819a5feb07091e28ec51f1e42e\",\"name\":\"jenmorrison\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d2f18e314f4bc0946664d3ffda5d5c3e3a1ac2e37b654517ed72548ff848ec2a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d2f18e314f4bc0946664d3ffda5d5c3e3a1ac2e37b654517ed72548ff848ec2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d2f18e314f4bc0946664d3ffda5d5c3e3a1ac2e37b654517ed72548ff848ec2a?s=96&d=mm&r=g\",\"caption\":\"jenmorrison\"},\"url\":\"https:\\\/\\\/www.climbcs.com\\\/ca\\\/news\\\/author\\\/jenmorrison\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Awareness Month: Meet the Vendors Powering Our Protection - Climb Channel Solutions CA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Awareness Month: Meet the Vendors Powering Our Protection - Climb Channel Solutions CA","og_description":"October marks Cybersecurity Awareness Month, a time dedicated to promoting safer digital practices and raising awareness about the ever-evolving threat...","og_url":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/","og_site_name":"Climb Channel Solutions CA","article_published_time":"2025-10-09T17:22:52+00:00","article_modified_time":"2025-10-14T15:00:03+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/10\/cybersecurity-month.jpg","type":"image\/jpeg"}],"author":"jenmorrison","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/#article","isPartOf":{"@id":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/"},"author":{"name":"jenmorrison","@id":"https:\/\/www.climbcs.com\/ca\/#\/schema\/person\/7f3d12819a5feb07091e28ec51f1e42e"},"headline":"Cybersecurity Awareness Month: Meet the Vendors Powering Our Protection","datePublished":"2025-10-09T17:22:52+00:00","dateModified":"2025-10-14T15:00:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/"},"wordCount":709,"image":{"@id":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/10\/cybersecurity-month.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/","url":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/","name":"Cybersecurity Awareness Month: Meet the Vendors Powering Our Protection - Climb Channel Solutions CA","isPartOf":{"@id":"https:\/\/www.climbcs.com\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/10\/cybersecurity-month.jpg","datePublished":"2025-10-09T17:22:52+00:00","dateModified":"2025-10-14T15:00:03+00:00","author":{"@id":"https:\/\/www.climbcs.com\/ca\/#\/schema\/person\/7f3d12819a5feb07091e28ec51f1e42e"},"breadcrumb":{"@id":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/#primaryimage","url":"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/10\/cybersecurity-month.jpg","contentUrl":"https:\/\/www.climbcs.com\/ca\/wp-content\/uploads\/sites\/8\/2024\/10\/cybersecurity-month.jpg","width":600,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.climbcs.com\/ca\/news\/cybersecurity-awareness-month-meet-the-vendors-powering-our-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.climbcs.com\/ca\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Awareness Month: Meet the Vendors Powering Our Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.climbcs.com\/ca\/#website","url":"https:\/\/www.climbcs.com\/ca\/","name":"Climb Channel Solutions CA","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.climbcs.com\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.climbcs.com\/ca\/#\/schema\/person\/7f3d12819a5feb07091e28ec51f1e42e","name":"jenmorrison","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d2f18e314f4bc0946664d3ffda5d5c3e3a1ac2e37b654517ed72548ff848ec2a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d2f18e314f4bc0946664d3ffda5d5c3e3a1ac2e37b654517ed72548ff848ec2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d2f18e314f4bc0946664d3ffda5d5c3e3a1ac2e37b654517ed72548ff848ec2a?s=96&d=mm&r=g","caption":"jenmorrison"},"url":"https:\/\/www.climbcs.com\/ca\/news\/author\/jenmorrison\/"}]}},"_links":{"self":[{"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/posts\/30731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/users\/70"}],"replies":[{"embeddable":true,"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/comments?post=30731"}],"version-history":[{"count":0,"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/posts\/30731\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/media\/29983"}],"wp:attachment":[{"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/media?parent=30731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/categories?post=30731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/tags?post=30731"},{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/resource_type?post=30731"},{"taxonomy":"solution","embeddable":true,"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/solution?post=30731"},{"taxonomy":"vendor_name","embeddable":true,"href":"https:\/\/www.climbcs.com\/ca\/wp-json\/wp\/v2\/vendor_name?post=30731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}