-
What does a successful TTX look like?
Read more: What does a successful TTX look like?In April, we opened the discussion of Tabletop Exercises (TTX). If you haven’t read that post, go here to read […]
-
TTX, A Critical Component to Your Cybersecurity Strategy
Read more: TTX, A Critical Component to Your Cybersecurity StrategyTabletop Exercises (TTX) have officially earned their position as a critical tool in the CISO’s toolbox. The use of TTX’s […]
-
Al Chat: Friend or Foe?
Read more: Al Chat: Friend or Foe?Recently there has been a lot of chatter around ChatGPT and the Bing Chat platform. These AI engines are being […]
-
DDOS Attack: 5 Ways to Prepare
Read more: DDOS Attack: 5 Ways to PrepareWith a recent wave of attacks performed by Killnet, organizations should be on high alert and be prepared for potential […]
-
Closing out the Year
Read more: Closing out the YearHere in the Northeast, the seasons are changing. The leaves have fallen, and the mornings are crisp, which means it’s […]
-
OpenSSL In the News
Read more: OpenSSL In the NewsEverywhere you look the past few days you read about OpenSSL. Recent news reported two vulnerabilities (CVE-2022-3602 and CVE-2022-3786) listed […]
-
Digging in
Read more: Digging inAs Penetration Testers (aka pentesters) we dig into the networks, applications, and devices of our clients. We dig deep to […]
-
Attacker in the Network
Read more: Attacker in the NetworkAn attacker is inside your network right now. If that is true, how would you know? Many technologies are in […]
-
5 Steps to Take Right Now
Read more: 5 Steps to Take Right NowThe world is complicated. The steps needed to secure an organization are more and more intricate by the day. There […]
-
MFA is a Requirement (but Not Perfect)
Read more: MFA is a Requirement (but Not Perfect)In the age of sophisticated phishing attacks and credential harvesting, multi-factor authentication (MFA) is a crucial part of any security […]
-
Trust but Verify
Read more: Trust but VerifyThe landscape of technology has changed drastically over the past two decades. Companies trying to do it all themselves is […]
-
Human Firewalls Need Updates Too
Read more: Human Firewalls Need Updates TooMany organizations have rolled out multi-factor authentication (a must) and other controls to protect their networks. Email threat detection is […]