Articles
-
Articles
The Difference Between IT and OT
Read moreSeptember 15, 2023
-
Articles
The Difference Between Incident Response, Disaster Recovery, and Business Continuity Plans
The goal of this article is to help identify the differences between these plans, the usefulness of them, and what NIST and FFIEC regulations have to say about them.
Read moreAugust 19, 2023
-
Articles
The Strength of SIEM: Why SIEM Solutions Are Invaluable to Small Institutions
Many large enterprises implement SIEM solutions, however, smaller institutions are hesitant when it comes to investing in these programs.
Read moreJuly 19, 2023
-
Articles
TSA Cybersecurity Regulations for Pipeline Owners & Operators
Following the Colonial Pipeline ransomware attack, the TSA has implemented cybersecurity regulations for pipeline owners and operators.
Read moreJune 29, 2023
-
Articles
The Importance of Remote and Onsite Social Engineering Testing for Your Organization
Both remote and onsite social engineering testing are crucial components of a robust security program. Here's what you need to know.
Read moreMay 24, 2023
-
Articles
Embracing a Secure Future: How Passkeys are Revolutionizing Authentication and Overcoming Password Vulnerabilities
The widespread reliance on passwords has long been a significant security concern for individuals and organizations. Passkeys are helping to solve this problem.
Read moreMay 17, 2023
-
Articles
Linux Malware further strengthens the links Lazarus Group to the 3CX Attack
North Korea-aligned threat actor, Lazarus Group, has been reported using Linux malware for the first time in its Operation DreamJob campaign.
Read moreMay 11, 2023
-
Articles
Ransomware Attacks on the Rise
Orchestrated by cybercriminals, ransomware attacks are targeting individuals, businesses, and even governments like never before.
Read moreMay 05, 2023
-
Articles
What Are Advanced Persistent Threats?
APTs can lead to data breaches and theft of sensitive information, disruption of operations, regulatory and legal repercussions, damage to brand reputation, increased costs, and even national security implications.
Read moreMay 02, 2023
-
Articles
Vulnerability: Cookie Missing "HttpOnly" Explained
One of the most common medium-risk vulnerabilities we find is the “Missing httpOnly Cookie Attribute” vulnerability.
Read moreApril 27, 2023