Featured Blog
Are You Ready for Red Team Penetration Testing?
In today’s rapidly evolving digital landscape, organizations are presented with an array of proactive cybersecurity strategies, and it can be hard to decide the next step in your cybersecurity journey. In this blog, we’ll dive into a few of our frequently asked questions about the difference between penetration testing and red team penetration testing, the […]
Incident Response, Zero day exploits
Double Trouble: Understanding Two Cisco Zero Day Vulnerabilities & Guide to Zero Day Attack Response
Business email compromise, Social Engineering
Social Engineering Scams: Cross-Tenant Impersonation Attacks, Voice Cloning Risks, and More
Microsoft Office 365
M365 Security: Leveraging CIS Standards for Optimal Security and Advanced Threat Mitigation
News, Social Engineering
2023 MGM Breach: A Wake-Up Call for Better Social Engineering Training for Employees
Compliance, Cybersecurity Planning, NIST CSF
Governance, Supply Chain, & Risk Management, Oh My! Understanding the New NIST CSF 2.0 Draft Guideline Changes
Email authentication
Understanding Email Authentication Protocols: A Technical Overview of SPF, DKIM and DMARC With Configuration Tips
Cybersecurity, Cybersecurity Planning