Defend Yourself Against the Next WannaCry With Vulnerability Scanning and...
A widespread ransomware campaign is affecting a large number of organizations across the globe. Currently, tens of thousands of infections have been reported in as many as 74 countries, including the...
View ArticleOffensive Security Certified Professional (OCSP) Course Recap
Offensive Security Certified Professional (OSCP) is an advanced certification in penetration testing. According to Offensive Security, an OSCP “has demonstrated their ability to be presented with an...
View ArticleILTACON 2022
Where is ILTACON 2022? The conference will be at the Gaylord National Resort & Convention Center, National Harbor, MD When is ILTACON 2022? The conference Starts: Aug 21, 2022 12:00 (ET) Ends:...
View ArticleLegalSEC Summit 2022
Join Kraft Kennedy CTO, Chris Owens for a spotlight session on Wednesday, October 12th at the LegalSEC Summit 2022. Attendees will gain insights into managing access to critical data and applications...
View ArticleWhy Is Patching So Important?
Why Is Patching So Important? Originally published on PinHawk Invisible Intruder Patching servers is a time-consuming and tedious task that many firms have been putting off due to resource constraints....
View ArticleEstablishing Trust in Zero Trust
What is Zero Trust? The ‘Zero Trust’ model is, in short, don’t trust, verify! A technology based defense to shore-up security vulnerabilities, the Zero Trust concept has quickly become the go-to...
View ArticleBeware of ‘Greatness’: Don’t Get Hooked by Phishing-as-a-Service
Bad actors are getting creative in their quest to access sensitive information. Awareness is one of best forms of defense and to that end, we’re sharing a two-minute overview of a notable newly...
View ArticleWindows and Linux Virtual Delivery Agent for CVAD and Citrix DaaS Security...
Issue A vulnerability has been identified that, if exploited, could result in the following security vulnerability: tr:nth-child(ODD) {background-color:#8ed1fc40;} CVD-ID Description Pre-Requisites CWE...
View ArticleThe Rise of Deepfakes
Imagine receiving a video message from a close friend claiming they have almost no cell reception but need immediate help getting home from what was supposed to be off-the-grid travel, but wound up...
View Article10 Tips for Managing Your Digital Identity
The shift to passwordless environments is catching on, but for most, passwords still serve as the keys to their digital world. The National Institute of Standards and Technology (NIST) defines a set of...
View Article
More Pages to Explore .....