Most recent

US Ballistic Missile Agency Fails Security Audit

We’ve spoken before about how difficult it is to secure important information at the level of individual US states. What about the U.S. military?

Read More
10 Jan 2019

What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?

For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and high-priority internal network segments use SMB to provide access to remote users. Although SMB is convenient for Windows and other networks, it’s also convenient for attackers.

Read More
17 Dec 2018

Red Team 101: Understanding Kali Linux

Your security environment is complicated. You’re invested in multiple security tools – antivirus, firewalls, IDS, IPS, SIEM, DLP, and more. If you haven’t invested in a red team, however, you’re doing security wrong.  How could you know that your expensive defenses are working unless you’ve tested them out?

Read More
14 Nov 2018

Botnets: The Living Dead of The Malware World

Mirai. Reaper. Hajime. 

The biggest IoT botnet threats to the healthcare industry today.

Read More
16 Aug 2018

4 DMZ Best Practices to Shield You From Attackers

In the cloud era, the DMZ has become more important – and more vulnerable – than its original architects ever thought possible.

Read More
08 Aug 2018

Will Platform Consolidation Dismantle Your Security Solutions?

The most logical step, following proliferation, is consolidation. This is a trend that we've seen in nearly every other industry after periods of intense innovation, and it's a trend that we're seeing now in information security.
Read More
06 Sep 2017

10 Ways To Secure Legal Documents

All companies have a responsibility to secure client documents, but the legal professional has an extended ethical obligation. Your legal professional has some of your most personal and business information and they must be diligent with security and securing legal documents.  

Read More
10 May 2017

How a Cybersecurity Upgrade Can Protect the US Elections

The year 2016 has not been kind to people who worry about cyber attacks. In addition to penetrating the campaigns of both major presidential candidates, attackers tentatively linked to Russia have compromised the state board of elections in two states, stealing two hundred thousand voter records.

Read More
06 Nov 2016

How to Overcome Technology M&A Security Risks

While an M&A article published earlier this year says that 2015 was the best-ever year, 2016 is shaping up to be on par with top executives searching for more mergers & acquisitions.
Read More
03 Nov 2016

Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!

Contact Us: