Group 440 3

Blog

  • Ready, Set, Goal

    Ready, Set, Goal

    It is often assumed that the goal of security is simple – “be secure.” The truth is, there are many […]

    Read more: Ready, Set, Goal
  • What does a successful TTX look like?

    What does a successful TTX look like?

    In April, we opened the discussion of Tabletop Exercises (TTX). If you haven’t read that post, go here to read […]

    Read more: What does a successful TTX look like?
  • TTX, A Critical Component to Your Cybersecurity Strategy

    TTX, A Critical Component to Your Cybersecurity Strategy

    Tabletop Exercises (TTX) have officially earned their position as a critical tool in the CISO’s toolbox. The use of TTX’s […]

    Read more: TTX, A Critical Component to Your Cybersecurity Strategy
  • Al Chat: Friend or Foe?

    Al Chat: Friend or Foe?

    Recently there has been a lot of chatter around ChatGPT and the Bing Chat platform. These AI engines are being […]

    Read more: Al Chat: Friend or Foe?
  • DDOS Attack: 5 Ways to Prepare

    DDOS Attack: 5 Ways to Prepare

    With a recent wave of attacks performed by Killnet, organizations should be on high alert and be prepared for potential […]

    Read more: DDOS Attack: 5 Ways to Prepare
  • Closing out the Year

    Closing out the Year

    Here in the Northeast, the seasons are changing. The leaves have fallen, and the mornings are crisp, which means it’s […]

    Read more: Closing out the Year
  • OpenSSL In the News

    OpenSSL In the News

    Everywhere you look the past few days you read about OpenSSL. Recent news reported two vulnerabilities (CVE-2022-3602 and CVE-2022-3786) listed […]

    Read more: OpenSSL In the News
  • Digging in

    Digging in

    As Penetration Testers (aka pentesters) we dig into the networks, applications, and devices of our clients. We dig deep to […]

    Read more: Digging in
  • Attacker in the Network

    Attacker in the Network

    An attacker is inside your network right now. If that is true, how would you know? Many technologies are in […]

    Read more: Attacker in the Network
  • 5 Steps to Take Right Now

    5 Steps to Take Right Now

    The world is complicated. The steps needed to secure an organization are more and more intricate by the day. There […]

    Read more: 5 Steps to Take Right Now
  • MFA is a Requirement (but Not Perfect)

    MFA is a Requirement (but Not Perfect)

    In the age of sophisticated phishing attacks and credential harvesting, multi-factor authentication (MFA) is a crucial part of any security […]

    Read more: MFA is a Requirement (but Not Perfect)
  • Trust but Verify

    Trust but Verify

    The landscape of technology has changed drastically over the past two decades. Companies trying to do it all themselves is […]

    Read more: Trust but Verify