Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Jeff Petters

What is Endpoint Security? A Complete Guide

Endpoint security is the discipline of locking down any element of an organization that is capable of obtaining internal access to resources such as databases or servers. It is a...

Read More

What is an Insider Threat? Definition and Examples

An insider threat is a security risk that originates within the targeted organization. This doesn’t mean that the actor must be a current employee or officer in the organization. They...

Read More

What is a Security Operations Center (SOC)?

A SOC is an outsourced office that is completely dedicated to analyzing traffic flow and monitoring for threats and attacks. In today’s world of cyberattacks and data breaches, companies of...

Read More

What is a DDoS Attack? Identifying Denial-of-Service Attacks

A Distributed Denial of Service (DDoS) attack is an attempt to crash a web server or online system by overwhelming it with data. DDoS attacks can be simple mischief, revenge,...

Read More

How to Use Netcat Commands: Examples and Cheat Sheets

The Netcat utility program supports a wide range of commands to manage networks and monitor the flow of traffic data between systems. Computer networks, including the world wide web, are...

Read More

What is CASB? All About Cloud Access Security Brokers

Cloud Access Security Brokers (CASB) are a security application that helps organizations manage and protect the data stored in the cloud. Gartner advises organizations to find a “Goldilocks” CASB solution...

Read More

Microsoft Office 365 File Sharing Guide: OneDrive and SharePoint Tips

Microsoft is pushing Teams- part of Office 365 – hard, and they report adoption rates that outpace Slack. You might not realize that Teams lives on top of SharePoint Online,...

Read More

What is ISO 27001 Compliance? Essential Tips and Insights

The International Organization for Standardization (ISO) is a global body that collects and manages various standards for different disciplines. In today’s world, with so many industries now reliant upon the...

Read More

How to Use Wireshark: Comprehensive Tutorial + Tips

If you find yourself troubleshooting network issues, and you have to inspect individual packets, you need to use Wireshark. Wireshark is the de facto, go-to, you-need-to-know-how-to-use, application to capture and...

Read More

Windows PowerShell Scripting Tutorial For Beginners

Windows PowerShell is a powerful tool for automating tasks and simplifying configuration and can be used to automate almost any task in the Windows ecosystem, including active directory and exchange....

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.