Search

Resources

armortext-named-a-leader-in-secure-communications
ArmorText was named a leader in The Forrester Wave™: Secure Communications Solutions, Q3 2024. According to Forrester’s evaluation, “ArmorText outclasses for SecOps, incident response, and threat intel sharing use cases.”
New and extremely sophisticated cyberattacks are taking organizations by surprise. Get the latest in our series of tabletops co-published with Crowell & Moring.
ArmorText, which safeguards communication for organizations worldwide, and the international law firm of Crowell & Moring LLP today released an update to their tabletop exercise guide, making new exercise scenarios publicly available under a Creative Commons license. The new Cyber Resilience: Incident Response Tabletop Exercises Q2 2024 addresses urgent challenges facing executives, including disruptive attacks by increasingly sophisticated criminal actors with well-publicized recent examples, as well as increasingly complex regulatory obligations.
Out-of-Band Communications [out-əv-band kə-myo͞o-ni-kā-shəns]: Any alternative channel for communications operating outside the standard, primary network…
Secure Out of Band Collaboration™ [si-kyoor out əv band kə-lab-ə-rey-shuhn]: A specific variant of out-of-band communications that further addresses security…
In the absence of secure out-of-band communications, adversaries gain substantial advantages through observing incident response communications…
A three-point checklist for evaluating Secure Out of Band Collaboration™ (SOOB-C) platforms developed alongside critical infrastructure thought leaders…
Secure Out of Band Collaboration™ (SOOB-C) is not just for crises; it is a strategic asset across various internal and external enterprise functions…
ArmorText’s approach offers unique benefits, ensuring continuity of communications when primary channels are compromised but also addressing vulnerabilities…
Partner Enablement Program
The program, designed to meet the rising demand for secure communication solutions during times of crisis, allows partners to create, manage, and administer ArmorText Private Directories and Federations/Trust Relationships.
In the last 18 months, ArmorText has seen a 33% increase in Fortune 500 customers, grown over 300% in Europe, and expanded significantly in 6 new critical infrastructure industries.
ArmorText has seen a 33% increase in Fortune 500 customers, grown over 300% in Europe, and expanded significantly in 6 new critical infrastructure industries.
Cross-Border-Reality-What-FBI-CISA-and-Canada’s-Cyber-Centre-Agree-On-About-Scattered Spider
This fall, SecTor returns to Toronto, bringing together cybersecurity practitioners from both sides of the border to share insights on fast-moving threats and the playbooks that actually work in the wild. Few topics warrant that cross-border lens more than Scattered Spider, a financially motivated threat collective whose evolving tactics in social engineering and identity abuse continue to challenge defenders.
Armortext-secure-out-of-band-communications-for-ir
A new FBI Cyber Division alert warns that during a cyber incident, the attackers might be listening in on your organization’s every move. In a July 29, 2025 joint advisory, the FBI and international partners reported on the ongoing activities of the “Scattered Spider” threat actor.
The-$3.5B-Wake-Up-Call-What-SEC-Messaging-Fines-Tell-Us-About-Communication-Risk

Communication risk now carries a hefty price tag. More than $3.5 billion in fines have been issued due to recurring failures involving unrecorded business messages on platforms like WhatsApp and Signal. The SEC (Securities and Exchange Commission) has made its stance clear: No more do-overs. You will get penalized for using technology that bypasses regulations.

Why-Energy-Companie-Move-Critical-Alerts-and-Threat-Feeds-Out-of-Band

With rising threats to operational technology (OT) environments, energy companies are rethinking how they deliver their most sensitive cybersecurity alerts and threat intelligence feeds. When conventional communication pathways are compromised—or even just suspected to be—out-of-band communication can mean the difference between staying ahead of an incident and losing critical time.

susie-wiles-deepfake-is-a-wake-up-call

Federal authorities are investigating deepfake voice calls claiming to be from Chief of Staff Susie Wiles. Senators, governors, and top executives were targeted.

Legal-Pitfalls-Why-Energy-Companies-Must-Ditch-Consumer-Privacy-Apps-During-a-Cyberattack

In the energy sector, a cyberattack is more than just a technical crisis—it’s a high-stakes moment with far-reaching consequences. Beyond the immediate chaos of containment and remediation, there are legal repercussions, regulatory scrutiny, and reputational risks to manage.

Ensuring-Operational-Continuity-During-a-Cyber-Breach-The-Role-of-Secure-Out-of-Band-Collaboration

What happens when the tools you rely on to manage a crisis become part of the problem? During a cyber breach, compromised communication channels can stall your incident response, expose critical remediation processes to adversaries, and create regulatory and reputational risks for your company.

Recovering-from-AI-Breaches-Why-Energy-Companies-Need-Secure-Out-of-Band-Collaboration

Artificial intelligence (AI) is profoundly transforming the energy sector by enhancing operational safety, efficiency, and security, as highlighted in the 2024 CESER-DoE report. However, these advancements come with significant risks. Adversaries are using sophisticated tools to target essential infrastructure, making AI a double-edged sword.

Under-Cyber-Siege-How-to-Coordinate-Incident-Response-Efforts-Away-from-Prying-Eyes

The frequency and sophistication of cyber threats continue to escalate, posing significant risks to critical infrastructures, particularly within the energy sector. Fundamental to national security and economic stability, these organizations find themselves on the front lines of cyber defense.

How-to-Safely-Engage-External-Advisors-During-Cyber-Incidents
Today’s digital world is constantly changing, with cyber threats becoming more complex and evolving rapidly. This presents significant challenges for businesses in all sectors, especially those operating within critical infrastructure. These threats don’t just affect the technical aspects; they also impact how an organization operates, its legal responsibilities, and its overall strategy.
Search