What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?
For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and high-priority internal network segments use SMB to provide access to remote users. Although SMB is convenient for Windows ... Read More
Red Team 102: Understanding Metasploit
Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing ... Read More
Managing the Intersection of Cryptocurrency and Compliance
Cryptocurrency startups are still all the rage these days, but many of these companies have had a "break rules first, settle lawsuits later" approach to operating ... Read More
MSSP vs MSP: What a Missing “S” Could Mean for Your Company
A missing “S” could cost your company dearly. Many otherwise-savvy business professionals don't know the difference between Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) ... Read More
130 Million Hotel Customers Breached Due to Exposed Database
Over the last few months, there’s been another massive security breach, one that you potentially haven’t heard of. Its scale was nearly as large as that of Equifax, with 130 million consumers affected ... Read More

State-Level Cybersecurity is Hard to Fix
Let’s set the scene. Back in 2015, an audit of the various departments making up the government of California showed that out of 77 agencies, 73 had failed to maintain compliance with reasonable security standards ... Read More