6 Ways Bad Actors Could Retaliate Using Cyber Attacks

6 Ways Bad Actors Could Retaliate Using Cyber Attacks

Over the past day, we’ve heard about the recent escalations between two particular countries. Nation-states usually will retaliate with one of their favorite weapons, cyber-attacks. We are only on day three of 2020, and the year has already started off...
Podcast: Using Automation And Threat Modeling To Protect Your Network

Podcast: Using Automation And Threat Modeling To Protect Your Network

Proper security hygiene is impossible without some form of automation. Too many hours are wasted due to manual effort when security and IT teams could be spending time on more critical issues. IT teams today are dealing with the impossible task of protecting their...
A VPN Is NOT A Security Tool! It’s In The Name

A VPN Is NOT A Security Tool! It’s In The Name

Some may argue that VPNs enhance security (encrypted connections etc.) but their core aim is privacy – it’s in the name – virtual private network. It’s a sad fact of life that nation-state actors and Big Tech, not to mention hackers, are interested in our...
3 New Technologies That Will Make IT’s Life Easier In 2020

3 New Technologies That Will Make IT’s Life Easier In 2020

The future is here and now! These are the top 3 new technologies that will make IT’s life that much easier in 2020. IT staff, the tech-savvy or geeks as we are known, differ a little from the general consumer and rarely offer blind allegiance to a company,...
5 Cybersecurity Trends To Look Out For In 2020

5 Cybersecurity Trends To Look Out For In 2020

2019 was an interesting year for cybersecurity, with a wide variety of data breaches that drove a growing awareness of the essential nature of cybersecurity and perhaps a deserved respect for those in the industry. Can we expect more of the same in 2020, or will...
Protecting Local Credentials With LAPS

Protecting Local Credentials With LAPS

One of the most significant issues faced in a Microsoft Windows environment is the ability to steal credentials and utilize these credentials to move throughout the network laterally. This task is made exceptionally easy for an adversary when a single backup local...