What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?

For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and high-priority internal network segments use SMB to provide access to remote users. Although SMB is convenient for Windows ... Read More

Red Team 102: Understanding Metasploit

|
Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing ... Read More

Managing the Intersection of Cryptocurrency and Compliance

Cryptocurrency startups are still all the rage these days, but many of these companies have had a "break rules first, settle lawsuits later" approach to operating ... Read More

MSSP vs MSP: What a Missing “S” Could Mean for Your Company

A missing “S” could cost your company dearly. Many otherwise-savvy business professionals don't know the difference between Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) ... Read More

130 Million Hotel Customers Breached Due to Exposed Database

Over the last few months, there’s been another massive security breach, one that you potentially haven’t heard of. Its scale was nearly as large as that of Equifax, with 130 million consumers affected ... Read More
State-Level Cybersecurity

State-Level Cybersecurity is Hard to Fix

| | Cyber Security
Let’s set the scene. Back in 2015, an audit of the various departments making up the government of California showed that out of 77 agencies, 73 had failed to maintain compliance with reasonable security standards ... Read More