Skip to the main content.
Contact
Contact

Blog

Be in touch with our latest news

Cybersecurity

SOC 2 compliance cloud

4 min read

Achieving SOC 2 Compliance for Cloud Services

As companies rely more on cloud services, cybersecurity frameworks like System and Organization Controls have become essential for establishing trust...

Read More >
Offensive Security Foundations for Financial Industry Professionals

3 min read

Offensive Security Foundations for Financial Industry Professionals

Security Standards (PCI DSS) are vital in establishing baseline security measures for financial industry professionals who face challenges...

Read More >
penetration testing for cybersecurity insurance

3 min read

Penetration Testing for Cybersecurity Insurance: What You Need to Know

As cybersecurity threats continue to evolve and become more sophisticated, the importance of robust security measures, coupled with comprehensive...

Read More >
cyber attack seasons

3 min read

Cyber Attack Seasons: Key Times When Businesses Are at Risk

While cyber attacks remain a persistent, year-round threat to organizations, cybersecurity professionals have discovered patterns in the frequency...

Read More >
cloud application security

3 min read

Enhancing Cloud Application Security: OWASP 2024 Guide for Developers

The Open Worldwide Application Security Project (OWASP) is an essential resource for developers, particularly those working with cloud-based systems....

Read More >

18 min read

Understanding the Risks Associated with NTLM Authentication

Despite the release of Kerberos more than 20 years ago, many enterprises today have not transitioned away from using NTLM authentication in their...

Read More >

3 min read

Enhancing Vulnerability Assessment and Risk Scoring with CVSS 4.0

In the realm of cybersecurity, accurately assessing and quantifying the severity of vulnerabilities is crucial for organizations to effectively...

Read More >

2 min read

The New Google .zip TLD: Examining Potential Cybersecurity Risks

On May 3rd Google introduced several new top-level domains (TLDs), including the .zip TLD which has generated warnings from the cybersecurity...

Read More >
Control Gap Vulnerability Roundup: August 13th to August 19th

3 min read

Control Gap Vulnerability Roundup: April 29th to May 5th

This week saw the publication of 294 new CVE IDs. Of those, 99 have not yet been assigned official CVSS scores, however, of the ones that were,...

Read More >