If you suspect an active attack on your business, call our emergency hotline at: 612-399-9680
If you suspect an active attack on your business, call our emergency hotline at: 612-399-9680

Emerging Cyber Threats: Insights from a Virtual Roundtable Discussion

blog photos (40)


Technology Source, a Technology Advisory Firm in Southern CA, interviewed executives from Blue Team Alpha, a Cybersecurity & Incident Response Firm headquartered in Minneapolis, MN. The ever-evolving landscape of emerging cyber threats presents ongoing challenges for organizations of all sizes. To shed light on the latest trends and provide valuable insights, a virtual roundtable discussion was held with cybersecurity experts. In this article, we will delve into the key points raised during the discussion, focusing on emerging threats and the necessary protections organizations should consider.

1. Evolution of Threat Actors

According to Joe Kingland, CEO of Blue Team Alpha, “Threat actors are taking their piece of the attack and iterating on that to make it better and give them better access, faster and more potent forms of ransomware.” He emphasizes the importance of proactive measures, such as regular data backups, strong access controls, and security patch management, to mitigate the risks associated with evolving ransomware threats.

2. AI-Driven Attacks

As Joe Kingland points out, “With the use of AI, cybercriminals have developed sophisticated phishing tools that craft messages which are increasingly difficult to spot. Spotting those obvious phishing emails is becoming a big challenge.” Organizations need to invest in AI-driven email security solutions and educate employees about the signs of phishing attempts to counter this emerging threat.

3. Insider Threats and Human Error

Joe Kingland highlights the significance of addressing human error, stating that “Studies have shown that a large portion of security breaches can be attributed to employee mistakes.” He emphasizes the need for security awareness training programs and fostering a culture of cybersecurity awareness within organizations to mitigate the impact of insider threats and human error.

4. Importance of Incident Response (IR) Practices

Sonya Meline, Vice President of Business Development at Blue Team Alpha, advises organizations on cybersecurity. She helps “ensure that any cybersecurity vendors you work with are either adept in incident response or are working with a professional incident response firm.” Meline emphasizes that having an IR-specific practice is crucial. More than 85% of organizations have experienced a breach of their network in 2022 alone. In the event of a security incident, an effective IR plan can minimize damage and facilitate a timely recovery.

Hand going through computer screen and holding a lock, with digital 1's and 0's in the background.


The virtual roundtable discussion, as summarized by industry experts, highlighted emerging cyber threats and the proactive measures organizations must take. Organizations can enhance their resilience against cyberattacks and effectively respond to security incidents. They do this by staying informed about emerging threats, implementing comprehensive protection strategies, and having a well-rounded incident response plan.

About Technology Source

Sourcing as a Service company with 500+ best-in-class business solutions, and over two decades earning trust around the globe. Technology Source pairs with midsize and enterprise organizations to modernize IT. As a trusted business advisor, Technology Source’s mission is to help our customers and advisors to win. They do this by unleashing the elements of enterprise technology solutions.

About Blue Team Alpha

A veteran-owned, comprehensive cybersecurity force on a mission to defend America in the cyberspace domain. It offers proactive, protection and rescue services with deep roots in incident management. Blue Team Alpha has amassed the highest caliber talent in the cybersecurity industry. Over 65% of their experts are former nation-state-level employees. They come from the Department of Defense, Department of Homeland Security and other government organizations. They learned from the world’s best cyber command.


Related Posts