46% of Databases Globally are Not Secure – and You Could be One of ThemIf there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your... BLOG How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads... Careless Employees: Sharing & Reusing Corporate Secrets September 2, 2021 A corporate secret is “any secret practices and processes that give a company a competitive advantage over its competitors.” To... Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that... How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape... Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would... Increasing Visibility to Find Signs of Reconnaissance and Lateral Movement July 23, 2021 Establishing an ATP (advanced persistent threat) has long been the goal of cyberattacks. By remaining undetected in the target environment,... Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically... How to Use Sysinternals for Cyber Security June 24, 2021 Sysinternals is a free suite of cybersecurity tools for Windows users that help you manage, troubleshoot, and diagnose your Windows... Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,... Best practices for protecting medical devices against ransomware attacks June 15, 2021 In this day and age, no government, business, or organization is safe from ransomware, not even our frontliners in the... How To Approach Cybersecurity in Critical Infrastructures June 9, 2021 A number of high-profile incidents show that the need for critical infrastructure security has never been greater. These essential industries... MITRE ATT&CK v9 is out and includes ATT&CK for Containers June 2, 2021 For those not familiar, ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques maintained by MITRE based on... Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
46% of Databases Globally are Not Secure – and You Could be One of ThemIf there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your...
BLOG How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads... Careless Employees: Sharing & Reusing Corporate Secrets September 2, 2021 A corporate secret is “any secret practices and processes that give a company a competitive advantage over its competitors.” To... Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that... How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape... Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would... Increasing Visibility to Find Signs of Reconnaissance and Lateral Movement July 23, 2021 Establishing an ATP (advanced persistent threat) has long been the goal of cyberattacks. By remaining undetected in the target environment,... Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically... How to Use Sysinternals for Cyber Security June 24, 2021 Sysinternals is a free suite of cybersecurity tools for Windows users that help you manage, troubleshoot, and diagnose your Windows... Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,... Best practices for protecting medical devices against ransomware attacks June 15, 2021 In this day and age, no government, business, or organization is safe from ransomware, not even our frontliners in the... How To Approach Cybersecurity in Critical Infrastructures June 9, 2021 A number of high-profile incidents show that the need for critical infrastructure security has never been greater. These essential industries... MITRE ATT&CK v9 is out and includes ATT&CK for Containers June 2, 2021 For those not familiar, ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques maintained by MITRE based on... Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...
How Ready Are You for a Ransomware Attack? September 8, 2021 Ransomware seems to be an ever-present threat to our cybersecurity with new high-profile attacks occurring all too often. This leads...
Careless Employees: Sharing & Reusing Corporate Secrets September 2, 2021 A corporate secret is “any secret practices and processes that give a company a competitive advantage over its competitors.” To...
Does Cybersecurity Workforce Gaps Distract Us from Leaks? September 1, 2021 64% of cybersecurity professionals report that their organization is facing some level of cybersecurity staff shortage. Unsurprisingly, 56% reported that...
How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape...
Why You’re Lacking Adequate Security Event Logs and How to Fix It July 28, 2021 Information is everything. When a security incident takes place that affects your systems, most security experts agree that they would...
Increasing Visibility to Find Signs of Reconnaissance and Lateral Movement July 23, 2021 Establishing an ATP (advanced persistent threat) has long been the goal of cyberattacks. By remaining undetected in the target environment,...
Do deep fake cyber-attacks pose an imminent threat? July 1, 2021 We’ve all seen the videos before. Today, most deepfake videos we see consist of influential people or celebrities being realistically...
How to Use Sysinternals for Cyber Security June 24, 2021 Sysinternals is a free suite of cybersecurity tools for Windows users that help you manage, troubleshoot, and diagnose your Windows...
Ransomware Gangs Have a New Trick Up their Sleeves: Double-Encrypting Your Data June 16, 2021 Ransomware that double-encrypts your data is an emerging trend among ransomware gangs looking to score big. As we learn everywhere,...
Best practices for protecting medical devices against ransomware attacks June 15, 2021 In this day and age, no government, business, or organization is safe from ransomware, not even our frontliners in the...
How To Approach Cybersecurity in Critical Infrastructures June 9, 2021 A number of high-profile incidents show that the need for critical infrastructure security has never been greater. These essential industries...
MITRE ATT&CK v9 is out and includes ATT&CK for Containers June 2, 2021 For those not familiar, ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques maintained by MITRE based on...
Threat Hunting vs Digital Forensics – What Are They? Do You Need Both? May 24, 2021 Threat hunting and digital forensics are just two of the cogs in a robust and multifaceted security machine. However, there...