Empowering Employees to Reduce Security Incidents

Empowering Employees to Reduce Security Incidents

In the hustle and bustle of our modern world, we can all get easily lost in the noise. One kind of noise is most frustrating for security teams: the noise of security ...
Disrupting an Attacker from Exploiting Domain Credentials

Disrupting an Attacker from Exploiting Domain Credentials

Security professionals often feel they don’t have enough time to keep up with modern threats. In fact, Crowdstrike researchers have found that top threat actors can go in and out of networks ...
Brute Force Attacks: Denying the Attacker, Not the User

Brute Force Attacks: Denying the Attacker, Not the User

According to haveIbeenpwned.com, close to 8 billion accounts have been compromised. The site provides a tool to see if any of your passwords have been compromised and are available on the dark-net ...
What State-Sponsored Attacks Can Teach Us About Conditional Access

What State-Sponsored Attacks Can Teach Us About Conditional Access

People often think that state-sponsored attacks from groups like Lazarus (North Korea), Fancy Bear (Russia) or menuPass (China) only target public federal organizations in Western nations like the U.S. This is simply ...
How to Thwart an Attacker’s Attempt to Compromise Credentials and Move Around a Network

How to Thwart an Attacker’s Attempt to Compromise Credentials and Move Around a Network

In the past year, we have seen numerous publicly traded corporations (Marriott and T-Mobile), airlines (Cathay Pacific and Delta), and tech companies (Facebook and Google+) all breached because of some type of ...
Conditional Access Establishes Trust In the Network

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more advanced and sophisticated in their techniques, the global threat is increasing ...
Three Ways to Limit the Cybersecurity Impact of the Government Shutdown

Three Ways to Limit the Cybersecurity Impact of the Government Shutdown

UPDATE (Jan. 25): Recent news reports state a deal has been reached to re-open the federal government through Feb 15. The issues outlined in this blog continue to apply to public and ...
Oceans 13 - Gambling Machine at Airport

With ⅓ of Enterprises Suffering from Weak or Exposed Passwords, Is Hollywood Part of the Problem?

What password would you use for a bank account soon to be worth $120 million? ...
What is Your Password?

6 Tips for Living a Healthy Digital Life and Avoiding Credential Theft This Holiday Season

| | Credential Compromise
Most of us still dream practical, down to earth, old fashioned dreams. And I’d place a bet that not many people, if any, dream about their credentials being stolen. Almost all of ...
We’re #1! And #2, #5, and #6 in Gartner Top 10 Security Projects

We’re #1! And #2, #5, and #6 in Gartner Top 10 Security Projects

At the recent Gartner Security & Risk Management Summit, analysts presented their findings on the top technologies for information security and their implications for security organizations in 2018. At the event Neil ...