Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Jeff Petters

What is a Whaling Attack?

A whaling attack is essentially a spear-phishing attack but the targets are bigger – hence whale phishing. Where spear-phishing attacks may target any individual, whaling attacks are more specific in...

Read More

Kerberos Attack: How to Stop Golden Tickets?

The Golden Ticket Attack, discovered by security researcher Benjamin Delpy, gives an attacker total and complete access to your entire domain. It’s a Golden Ticket (just like in Willy Wonka)...

Read More

The State of CryptoWall in 2018

CryptoWall and its variants are still favorite toys of the cybercriminals that want your Bitcoin. In fact, according to the 2018 Verizon Data Breach Investigation Report, ransomware incidents now make...

Read More

What’s The Difference Between a Proxy and a VPN?

The Internet can be a scary place: we’re under near constant attack from ransomware and botnets – on work computers, personal devices, even smart home devices like thermostats and baby...

Read More

What is a Proxy Server and How Does it Work?

The actual nuts and bolts of how the internet works is not something a people often stop to consider. The problem with that is the inherent danger of data security...

Read More

What is Spear Phishing?

According to the 2018 Verizon Data Breach Report, phishing and pretexting are the two favorite tactics employed in social engineering attacks, used in 98% and 93% of data breaches respectively....

Read More

Data Migration: Guide to Success

More than 50% of data migration projects will exceed budget and/or harm the business due to flawed strategy and execution, according to Gartner. Nevertheless – data migrations are a fact...

Read More

NIST 800-53: Definition and Tips for Compliance

NIST sets the security standards for agencies and contractors – and given the evolving threat landscape, NIST is influencing data security in the private sector as well. It’s structured as...

Read More

5 FSMO Roles in Active Directory

Active Directory (AD) has been the de facto standard for enterprise domain authentication services ever since it first appeared in late 1999 (in Windows Server 2000). There have been several...

Read More

Risk Management Framework (RMF): An Overview

The Risk Management Framework (RMF) is a set of criteria that dictate how United States government IT systems must be architected, secured, and monitored. Originally developed by the Department of...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.