News

Guest Column: Why AI Isn't Quite So Easy

Guest Column: Why AI Isn't Quite So Easy

In a guest article for the Arkansas Democrat-Gazette, Chris Wright, co-founder and partner at Sullivan Wright Technologies, said that...

One Layer of Protection is Bad, Duh.

One Layer of Protection is Bad, Duh.

If you are a student of history, specifically the time between the World Wars, you've undoubtedly heard of the...

AI Hype Bubble Continues to Deflate

AI Hype Bubble Continues to Deflate

In the last few weeks we've seen a number of big names admit that the GenAI and LLM buzz...

Tips for Staying Safe After Google Cyberattack

Tips for Staying Safe After Google Cyberattack

Sullivan Wright Technologies co-founder and partner Chris Wright joined KATV’s Little Rock ARC, a daily lifestyle show, to discuss...

Pop Goes the AI Bubble?

Pop Goes the AI Bubble?

In an Arkansas Business article, Chris Wright, co-founder and partner of Sullivan Wright Technologies, explored whether the massive rush...

Prepare Yourself for Scams from Fake Coworkers, Bosses, and Relatives

Prepare Yourself for Scams from Fake Coworkers, Bosses, and Relatives

You've no doubt heard the term "deepfakes" by now. With all the generative AI tools we have at our...

Misinformation and Disinformation Lead to Bad Decisions

Misinformation and Disinformation Lead to Bad Decisions

You may have heard the terms "disinformation" and "misinformation" in the past but never really understood their meaning or...

Spotting (and Stopping) Text Scams

Spotting (and Stopping) Text Scams

Little Rock Soiree recently sat down with the experts at Sullivan Wright Technologies for its monthly newsletter, The Work...

Shiny AI Facade is Starting to Crumble

Shiny AI Facade is Starting to Crumble

To clarify, we are not anti-AI. We know there are brilliant use cases for the broad collection of technologies...

Phishing for the Tech Unsavvy

Phishing for the Tech Unsavvy

Three recently discovered attacks have me a bit more worried than usual. The technical attacks against infrastructure are typically...

Governments Urge Detection Controls

Governments Urge Detection Controls

If you've known us for very long, you know that our security program is based on the broad lifecycle...

Penny Wise and Pound Foolish

Penny Wise and Pound Foolish

We've all heard the quote but do we really understand the deep meaning. In business, I'm sure many of...

Arkansas Data Breach Lawsuits

Arkansas Data Breach Lawsuits

We've seen a number of cybersecurity-related lawsuits filed here in Arkansas lately. We can judge these however we wish...

Text Phishing Bypass Tactic

Text Phishing Bypass Tactic

By now, you've probably seen the unpaid toll text message phish about 100 times or more....

Click to Fix Cyber Attacks

Click to Fix Cyber Attacks

In cybersecurity, we love giving silly names to cyber attacks... phishing, smishing, vishing, and what the heck is quishing?...