Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Articles by

David Harrington

How to Monitor Network Traffic: Effective Steps & Tips

No matter how communications and information technology evolves, data in motion will always exist. Hackers will always target the main arteries and thoroughfares of data flow, so monitoring network traffic...

Read More

What is a Security Operations Center (SOC)?

With cyberattacks and data breaches on the rise, companies of all sizes need to place an emphasis on securing their technology assets. However, assembling a full-time in-house IT security team...

Read More

The MITRE ATT&CK Framework: A Comprehensive Guide

The MITRE ATT&CK framework is a global knowledge base hub for documenting various tactics and techniques that hackers use throughout the different stages of a cyberattack. The MITRE company began...

Read More

Zero-Day Vulnerability Explained

There’s nothing hackers love more than picking low-hanging fruit in terms of systems weaknesses. And that’s exactly what a zero-day vulnerability attack does. A zero-day vulnerability is a software bug...

Read More

Illinois Privacy Law Compliance: What You Need to Know

The state of Illinois has recently passed several key pieces of legislation designed to bolster the data privacy rights and protections of residents. Illinois privacy law seeks to achieve similar...

Read More

Password Spraying: What to Do and Prevention Tips

When it comes to password hacking, most organizations are quite familiar with brute force attacks, where cybercriminals continually guess passwords via computer algorithms tens of thousands of times in seconds...

Read More

Microsoft LAPS Overview: Setup, Installation, and Security

Microsoft LAPS is one of the most effective ways to protect administrator passwords and prevent unauthorized users from accessing systems or data that they shouldn’t. Microsoft’s Local Administrator Password Solution...

Read More

The Ultimate Guide to Procmon: Everything You Need to Know

Knowledge is power when it comes to maintaining a proactive cybersecurity posture. Knowing what’s going on within your systems and monitoring networks for potential issues, hacks, or malware is critical...

Read More

Texas Privacy Act: Overview and Compliance Guide

Many countries, states, and jurisdictions have recently passed — or are planning to pass — legislation to protect the privacy and data rights of consumers. The state of Texas is...

Read More

Ultimate Ransomware Guide: Types and Definitions of Ransomware Attacks

Ransomware attacks can result in significant loss of data, system functionality, and financial resources. But exactly what is ransomware? Ransomware can take a variety of shapes and forms, not to...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.