Virtual Security Operations Center VSOC
As new and maturing technologies such as IoT, artificial intelligence, mobile, and cloud redefine our perimeters, their endpoints also become potential points of entry for attackers.
As new and maturing technologies such as IoT, artificial intelligence, mobile, and cloud redefine our perimeters, their endpoints also become potential points of entry for attackers.
The Scary Side of Cybersecurity: Why On-Premise Penetration Testing is Key
Join our cyber threat team as they explore the evolving landscape of on-premise penetration testi...
Read More about The Scary Side of Cybersecurity: Why On-Premise Penetration Testing is Key
The Worst Case Scenario: What Happened in the CrowdStrike Outage?
The world was recently shaken by a global outage brought about by a faulty software update by Cro...
Read More about The Worst Case Scenario: What Happened in the CrowdStrike Outage?
Vendor Selection: In-house or Outsourced
Occasionally, I encounter companies that want to conduct their own penetration testing. They ofte...
Cyber Warfare Playbook: Offensive Strategies for Resilient Organizations
While traditional cybersecurity approaches often focus heavily on defensive measures such as fire...
Read More about Cyber Warfare Playbook: Offensive Strategies for Resilient Organizations