IT Security | July 30, 2020Unfolding the Twitter security incident In case 2020 wasn't dystopian enough, here's some more unbelievable news. On July 15, 2020...
IT Security | July 7, 2020Telecommunications giant reveals an Active Directory server breach. What can we learn from it? We've always been vocal about the imminent threat of breaches and propagated the message...
IT Security | April 23, 2020Hardening Windows security: How to secure your organization—Part 3 This is the final blog of our three-part blog series on living-off-the-land (LOTL) attacks...
IT Security | April 22, 2020Breaking down the San Francisco airport hack On April 7, 2020, the San Francisco International Airport (SFO) released a notice...
IT Security | April 16, 2020Hardening Windows security: How to secure your organization—Part 2 We're back with part two of our three-part blog series on living-off-the-land attacks. If...
IT Security | April 9, 2020Hardening Windows security: How to secure your organization—Part 1 The cybersecurity threat landscape is quickly changing. Administrators have become more...
IT Security | April 8, 2020IT security and risk: 10 must-audit events in hybrid Active Directory that can lead to a breach [Slide deck] The definition of an “attack” is changing. The level of complexity and technical expertise...