Assura’s Top 5 Misconceptions about Penetration Testing

Assura’s Top 5 Misconceptions about Penetration Testing

| | services
With the increasing number of organizations now seeking penetration testing due to regulatory requirements, more and more companies are claiming to offer a service that checks this box. Assura wanted to help ...
Assura’s Top 5 Misconceptions about Penetration Testing

Assura’s Top 5 Misconceptions about Penetration Testing

| | services
With the increasing number of organizations now seeking penetration testing due to regulatory requirements, more and more companies are claiming to offer a service that checks this box. Assura wanted to help ...

Understanding the Benefits of Managed Cyber Services

As part of our upcoming attendance at the International Cyber Expo & International Security Expo, we were lucky enough to sponsor The Cyber Security Webinar Series with Nineteen Group and Grey Hare ...

RansomCARE

| | Monitoring, services
RansomCARE Proactive risk mitigation & 24/7 incident management – on-site and remote. Contact us Contact us Download Solution Brief Overview – Remember, not every breach needs to be a catastrophe. Why do ...

MyCISO

| | services, Strategic
MyCISO Service Implementing Targeted Security Strategies to Secure Your Assets Contact us Contact us Download Solution Brief Overview Today, it is as easy to purchase a piece of malware off the Darknet ...
How phishing scammers manipulate your amygdala and oxytocin | Christopher Hadnagy | TEDxFultonStreet

The Rise of Phishing Attacks: P.S. ILoveYou

In This Issue: "The Rise of Phishing Attacks: P.S. I Love You". IILOVEYOU. Did you ever receive an email with that subject line? Millions did in May 2000. It was a game ...
automation

A Guide to Finding a Trusted MSSP

MSSPs can be essential in helping organizations complete their security posture. Here’s what to look for. Enterprises often lack the internal resources to do security right, especially considering tasks and responsibilities are ...
Security Boulevard

20 Critical Security Controls: Control 9 – Limitation and Control of Network Ports, Protocols, and Services

Today, I will be going over Control 9 from version 7 of the CIS top 20 Critical Security Controls – Limitation and Control of Network Ports, Protocols, and Services. I will go ...
cybercrime ecrime Providing Security Be a Crime

Can Providing Security Be a Crime?

| | criminality, Law, services, software
The purpose of security is to allow the “right” people to have access to data and resources and to keep others out. It is ultimately about having control over data and data ...
Security Boulevard
Kansa: Service related collectors and analysis

Kansa: Service related collectors and analysis

In my previous post on Kansa's Autoruns collectors and analysis scripts, I mentioned that the Get-Aurounsc.ps1 collector relies on Sysinternals' Autorunsc.exe to collect data on all of the Autostart Extension Points (ASEPs) that ...