Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

IT Pros

Articles

How to Use Microsoft Teams Safely: Security and Compliance Guide

Microsoft Teams is the lynchpin in the Office 365 portfolio. It brings all the other products together, gets users collaborating, and opens several lines of communication all from a single...

Read More

Sysmon Threat Analysis Guide

Over the course of my pen testing experiments for the IOS blog, I’ll often “go to the video” —  that is take a peek into the Windows Event logs —...

Read More

What Is Cryptojacking? Prevention and Detection Tips

We live in a digital age, with more people than ever doing most, if not all, their financial transactions and shopping online. With this also came the rise in cryptocurrencies....

Read More

How to Use Nmap: Commands and Tutorial Guide

Nmap is a network mapper that has emerged as one of the most popular, free network discovery tools on the market. Nmap is now one of the core tools used...

Read More

What Working in Cybersecurity is Really Like: A Day in the Life

There are a lot of reasons to pursue a career in cybersecurity. Across the board, cybersecurity roles offer competitive pay, growth opportunity, job security, exciting day-to-day tasks and the chance...

Read More

What Is Network Access Control? Solutions and Explanations

Given how complex the topic of cybersecurity is in today’s high-tech world, many organizations feel the need to tackle it from various angles. They procure an antivirus solution from one...

Read More

10 Secure File Sharing Options, Tips and Solutions

It’s astounding to think about how much digital data is transmitted over the internet on a daily, hourly, or even minutely basis. Every time a web page is loaded or...

Read More

Insider Threats: Hard Lessons From WMI Eventing and Surveillance

Last time, we explored how a hypothetical insider could use the Windows Management Interface (WMI) and its eventing system to surveil other employees. No, I’m not the first person to...

Read More

What is a Security Operations Center (SOC)?

A SOC is an outsourced office that is completely dedicated to analyzing traffic flow and monitoring for threats and attacks. In today’s world of cyberattacks and data breaches, companies of...

Read More

How to Use Netcat Commands: Examples and Cheat Sheets

The Netcat utility program supports a wide range of commands to manage networks and monitor the flow of traffic data between systems. Computer networks, including the world wide web, are...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.