The Deployment That Shouldn’t Have Gone Live During an incident response engagement last year, we pulled the deployment logs for a mid-sized financial services company and found something that should…
The Audit Starts Before You Open the Console A financial services client came to us after a compliance review flagged an eleven-day gap in their Office 365 threat detection. They…
We inherited an environment where an S3 bucket had been publicly readable for 14 months. The client ran monthly vulnerability scans. They had a SIEM. They had endpoint detection and…
A financial services firm we work with had a problem they didn’t know they had. Their perimeter firewall was clean. Antivirus showed no alerts. The SOC hadn’t received a priority…
Three weeks into a ransomware investigation at a mid-size logistics firm, the IR team handed me what they called a “forensic copy” of the infected server. It had been rebooted…
Your SIEM generated zero critical alerts during the four-hour window on Tuesday night. Your first instinct is to call it a quiet shift. But three of the most damaging incidents…
In March 2023, Cl0p operators compromised a regional financial services company and reached their domain controllers in 87 minutes. The initial vector was a spearphishing email. From there, the attack…
Beyond the traditional IaaS, PaaS, and SaaS models, modern cloud computing delivers a growing range of specialized services collectively known as XaaS – Anything as a Service. For IT professionals…
Cybersecurity naming conventions are standardized rules for labeling digital assets – including user accounts, firewall rules, log files, and security policies. Organizations that adopt consistent naming standards reduce misconfiguration risk,…
Endpoint security is the practice of protecting every device that connects to your organization’s network – laptops, desktops, servers, smartphones, and tablets – from cyber threats. With remote work now…