The Deployment That Shouldn’t Have Gone Live During an incident response engagement last year, we pulled the deployment logs for a mid-sized financial services company and found something that should…
In March 2023, Cl0p operators compromised a regional financial services company and reached their domain controllers in 87 minutes. The initial vector was a spearphishing email. From there, the attack…
Cybersecurity naming conventions are standardized rules for labeling digital assets – including user accounts, firewall rules, log files, and security policies. Organizations that adopt consistent naming standards reduce misconfiguration risk,…
Endpoint security is the practice of protecting every device that connects to your organization’s network – laptops, desktops, servers, smartphones, and tablets – from cyber threats. With remote work now…