Blog

As your company grows, so does your reliance on cloud applications. Without proper oversight, cloud service usage can expose your organization to significant security vulnerabilities due to a lack of

4 min read

Threat actors thrive on stolen credentials, and enterprise emails are often their top prize. While much attention is given to zero-days and vulnerabilities, leaked credentials from third-party data breaches are

2 min read

Organizations are continuing to grapple with a cybersecurity talent shortage during a time of rapid growth of AI-driven threats. The rise in AI usage applies not only to security teams

3 min read

In light of escalating global conflicts, increased nation-state activity, and widespread geopolitical instability, cybersecurity threats have intensified across many different sectors. All organizations should be proactively strengthening awareness and readiness

4 min read

Organizations are continuing to grapple with a cybersecurity talent shortage during a time of rapid growth of AI. The rise in AI usage applies to not only security teams, but

3 min read

The days of securing digital identities with a simple password are over. Consider: 80 percent of all breaches use compromised identities, costing enterprises billions. And with SaaS applications and AI

3 min read

On a recent internal penetration test, I was able to obtain Domain Admin privileges in a segmented network by calling on my ancient digital forensics skill set. I got my

5 min read

By Trevor Olson Recently, SlashNext (and many others) published an interesting article on ‘SessionShark,’ a phishing-as-a-service toolkit designed to steal session tokens and bypass Microsoft MFA. Their discussion around the

4 min read

In today’s digital age, cybersecurity is no longer just an IT issue, it’s a critical business risk that can impact every aspect of an organization. This is even more true

3 min read