Featured Blog
6 Steps For Building a Strong Security Culture in Your Organization
Part 2 of: “Solving 3 Common Security Gaps Through Better Cybersecurity Collaboration” Every organization needs to build a strong security culture. As discussed in my first blog in this 3-part series, building and maintaining a strong cybersecurity posture requires collaboration between IT staff and an organization’s management team. Yet building effective collaboration can be harder […]
Cyberattacks, Pen Testing
A Real-World Cyber Attack Simulation: How a Hacker Can Breach Your Organization in One Weekend
Pen Testing, Security contols, Security Controls Reports
Top Cybersecurity Control for Q4 2023: Penetration Testing
Incident Response, Zero day exploits
Double Trouble: Understanding Two Cisco Zero Day Vulnerabilities & Guide to Zero Day Attack Response
business email compromise, Social Engineering
Social Engineering Scams: Cross-Tenant Impersonation Attacks, Voice Cloning Risks, and More
Microsoft Office 365
M365 Security: Leveraging CIS Standards for Optimal Security and Advanced Threat Mitigation
News, Social Engineering