Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

IT Pros

Articles

24 Essential Penetration Testing Tools

Penetration testing has become an essential part of the security verification process. While it’s great that there are many penetration testing tools to choose from, with so many that perform...

Read More

PowerShell Remoting: Cheat Sheet and Guide

Windows PowerShell 2.0 made a powerful new technology available for system administrators: remoting. Remoting has increased in importance in each PowerShell iteration since then, and future Microsoft products will rely...

Read More

SANS Top 20 Critical Controls to Know

The SANS Top 20 Critical Controls are well-respected guidelines that organizations follow to protect their networks and intellectual property from cyberattacks. SANS is a 30-year-old research and educational organization that...

Read More

Malware Protection: Basics and Best Practices

Malware is simply a piece of code that attempts to hide and perform a predetermined set of actions to gain access to sensitive data or cause disruption in the operations...

Read More

Sysmon Threat Analysis Guide

In my various pentesting experiments, I’ll pretend to be a blue team defender and try to work out the attack. If you have good security eyes, you can search for...

Read More

The No Hassle Guide to Event Query Language (EQL) for Threat Hunting

Did you ever have the urge to put together a few PowerShell scripts to parse and analyze the Sysmon event log in order to create your own threat analysis software?...

Read More

What is an IT Security Audit? The Basics

A security audit is the high-level description of the many ways organizations can test and assess their overall security posture, including cybersecurity. You might employ more than one type of...

Read More

How to Use Microsoft Teams Safely: Security and Compliance Basics

Microsoft Teams is the lynchpin in the Office 365 portfolio. It brings all the other products together, gets users collaborating, and opens several lines of communication all from a single...

Read More

What Is Cryptojacking? Prevention and Detection Tips

We live in a digital age, with more people than ever doing most, if not all, their financial transactions and shopping online. With this also came the rise in cryptocurrencies....

Read More

How to Use Nmap: Commands and Tutorial Guide

Nmap is a network mapper that has emerged as one of the most popular, free network discovery tools on the market. Nmap is now one of the core tools used...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.