Sitemap

Attack Surface Management with RiskIQ’s PassiveTotal Platform

            Every organization has an attack surface, consisting of all the hardware, software, SaaS resource and cloud-based assets that connect to the internet. Everything from web servers and web applications to network assets, IoT...

Attack Surface Management: Dark Web Deep-Dives and More

            Attack surface management is an up-and-coming security domain focused on proactively identifying and alerting on cyber threats and risks across a company’s ever-expanding internet-connected “footprint”: web servers, network...

What is Attack Surface Management and Why Should We (as an Organization at Risk of Cyberattack) Care?

            Every organization with internet-facing assets has the same basic concerns when it comes to cybersecurity risk. Where are we exposed and vulnerable? What attacks and risks are we most likely to face in the current threat...

Cybersecurity Impacts of COVID-19: 2022 Update

          COVID-19 responses like a remote work operating model with “vaporized” network perimeter, accelerated digital transformation and economic and workforce instability have been “the new normal” for so long now, they’re not really news....

‘Twas the Night after Christmas, and the Hackers were Stirring…

            The story that follows, told by our partner wekos, an MSP focused on IT resiliency, is perfect for the season, as it is a Christmas story. Like most Christmas stories, normalcy is interrupted when a challenge is presented, and...

10 Top CMMC Assessment Checklist Resources

          Businesses that provide products or services to the US Defense Industrial Base (DIB) need to conform with the FAR (e.g., 52.204-12) and DFAR (e.g., 252.204-7012, 7019, 7020, 7021) requirements.  For those handling Controlled...

Web Application Attacks are Skyrocketing—Don’t Get Caught in the Crossfire

          Recent research from Akami, Imperva and others show that web application attacks have increased by up to 300% since last year, resulting in a flood of data breaches and the potential exposure of billions of compromised consumer...

Go easy on the cookies this holiday season: Stay safe by avoiding unwanted browser cookies!

            By: Jeff Stetz Cookies (the edible kind) are a cherished holiday tradition that few of us would want to give up completely! But it’s a good idea to be selective…   [perfectpullquote align="full" bordertop="false" cite=""...

Severe Log4j 2 Vulnerability Puts Huge Swath of Enterprise and SaaS Apps at Grave Risk

          The recent emergence of CVE-2021-44228, the so-called Log4Shell vulnerability, is a critical flaw affecting multiple versions of the ubiquitous Apache Log4j 2 Java logging framework. Attackers are already scanning the internet for...

Skills SMBs Should Look for in a Privacy Lead

            If there’s one thing that can be confusing within the growing number of national and US state-level privacy laws, it’s the terminology and requirements for a Data Protection Officer (DPO), privacy officer, privacy lead, etc....