Social Engineering
One of the most common methods used to gain unauthorized access to corporate networks, social engineering accounted for 43 percent of the documented breaches in 2016.
One of the most common methods used to gain unauthorized access to corporate networks, social engineering accounted for 43 percent of the documented breaches in 2016.
The Scary Side of Cybersecurity: Why On-Premise Penetration Testing is Key
Join our cyber threat team as they explore the evolving landscape of on-premise penetration testi...
Read More about The Scary Side of Cybersecurity: Why On-Premise Penetration Testing is Key
The Worst Case Scenario: What Happened in the CrowdStrike Outage?
The world was recently shaken by a global outage brought about by a faulty software update by Cro...
Read More about The Worst Case Scenario: What Happened in the CrowdStrike Outage?
Vendor Selection: In-house or Outsourced
Occasionally, I encounter companies that want to conduct their own penetration testing. They ofte...
Cyber Warfare Playbook: Offensive Strategies for Resilient Organizations
While traditional cybersecurity approaches often focus heavily on defensive measures such as fire...
Read More about Cyber Warfare Playbook: Offensive Strategies for Resilient Organizations