Blog

February 24, 2022

Using Sender Policy Framework to Mitigate Spoofing

Tulsie Narine

What is Sender Policy Framework (SPF) and how exactly does the protocol work?

Read Now

Log4J Exploit Detection (CVE-2021-44228)

Elizabeth Fichtner

CVE-2021-44228 – how to easily detect if your web server has been exploited and infected.

Read Now
February 23, 2022

The Most Common Cloud Security Threats and How to Avoid Them

Elizabeth Fichtner

Security threats and other risks of cloud computing still exist, and companies should take steps to avoid (or at least mitigate) them.

Read Now
February 22, 2022

Cybersecurity 101: What You Need To Know About False Positives and False Negatives

Elizabeth Fichtner

Understanding the differences between false positives and false negatives, and how they’re related to cybersecurity is important for anyone working in information security.

Read Now
February 21, 2022

5 Amazing Applications of Deep Learning in Cybersecurity

Elizabeth Fichtner

Deep Learning (DL), an AI methodology, is propelling the high-tech industry to the future with a seemingly endless list of applications.

Read Now
February 18, 2022

What is a Cyber Security Compromise Assessment?

Elizabeth Fichtner

A compromise assessment is focused on looking at the current state of the health of your ecosystem and is a critical point in defining the treatment of found threats.

Read Now
February 17, 2022

A Practical Guide to Building a Cyber Incident Response Team

Elizabeth Fichtner

An effective CIRST can help respond quickly to security incidents, mitigating the damage caused to the organization.

Read Now
February 15, 2022

Cyber Security Compromise Assessments vs Vulnerability Assessments

Elizabeth Fichtner

Cyber Security Compromise (Risk) Assessments vs. Vulnerability Assessments: Which Should You Choose First?

Read Now
February 14, 2022

7 Risks Posed by Open-Source Software and How to Defend Yourself

Elizabeth Fichtner

Knowing the risks posed by open-source software — going into the development process — will help you avoid pitfalls associated with sharing crowd-sourced code.

Read Now