Resources
Cybersecurity white papers, data sheets, webinars, videos and more
Resource Library
March 7, 2024
What is Domain Hijacking and How Do I Prevent it?
Your online presence is a vital aspect of your personal and business identity. Your domain name is not just a web address; it represents your brand, your reputation, and often, your livelihood. However, with the increasing value of domain names, they have become targets for cybercriminals… Read More
Tech Center
March 6, 2024
What is Sentinel? Harnessing the Power of Cloud-Native SIEM for Modern Cybersecurity Challenges
In the rapidly evolving landscape of cybersecurity, staying ahead of threats requires not just vigilance but advanced technology. Sentinel, Microsoft’s cloud-native Security Information and Event Management (SIEM) solution, represents a leap forward in the way organizations detect, investigate, and respond to cyber threats. This blog post… Read More
Tech Center
March 6, 2024
SMB Port Numbers: A Guide to Optimizing and Securing Your Network
In the digital age, where data is the new gold, ensuring the security and efficiency of network communication is paramount for businesses of all sizes. The Server Message Block (SMB) protocol plays a crucial role in facilitating file sharing, network browsing, and printer access among devices on a… Read More
Tech Center
March 6, 2024
New Malware Attributed to Russian Hacking Group APT28
Late last year, the Computer Emergency Response Team of Ukraine (CERT-UA) released an advisory that reported cyberattacks targeting Ukrainian state organizations attributed to the Kremlin-backed nation-state group APT28, aka Fancy Bear/Sofacy. The advisory listed the use of a new backdoor named “OCEANMAP,”… Read More
Cyber Threat Intelligence
March 5, 2024
Remediation vs Mitigation in Cybersecurity: Understanding the distinctions and strategic applications
In the ever-evolving landscape of cybersecurity, where threats lurk around every digital corner, organizations must be armed with the right strategies to protect their assets and data. Two important terms often discussed in this realm are “remediation” and “mitigation… Read More
Tech Center
March 5, 2024
Leveraging SIEM Splunk for Enhanced Cybersecurity: A Comprehensive Guide
With the increasing sophistication of cyber threats, organizations must arm themselves with robust tools and strategies to protect their assets and data. One such tool that has gained widespread adoption is Security Information and Event Management (SIEM) software, with Splunk being a leading… Read More
Tech Center
March 5, 2024
Analyzing FERPA Violation Examples to Strengthen Data Privacy in Education
Educational institutions collect vast amounts of student data to improve learning outcomes, personalize education, and streamline administrative processes. However, with the proliferation of technology comes increased concerns about data privacy and security breaches. The Family Educational Rights and Privacy Act (FERPA) is a… Read More
Tech Center
March 4, 2024
What Are Proactive Ransomware Prevention Strategies for 2025?
Ransomware attacks remain one of the most destructive and costly cyber threats facing organizations today. These malicious software attacks encrypt files on a device, rendering them inaccessible to users, and demand a ransom for decryption keys. Many hacking groups exploit remote infrastructure, leverage… Read More
Attack Surface Management
Tech Center
March 1, 2024
SecurityScorecard 2024 Global Third-Party Cybersecurity Breach Report: Software supply chain is top target for ransomware groups
The SecurityScorecard Global Third-Party Breach Report uses the world’s largest proprietary risk and threat dataset to provide unique insights into the intricate web of supply chain vulnerabilities exploited by ransomware groups. As the digital landscape continues to evolve, so too do the tactics of cyber… Read More
Cyber Threat Intelligence
Supply Chain Cyber Risk
February 23, 2024
Implementing Non-Repudiation in Your Security Strategy: Best Practices and Techniques
Trying to run a secure business? Then you know that defending against unauthorized access is only half the battle. The other half is ensuring that when a transaction or communication does happen, the responsible party can never successfully deny it. That essential layer of… Read More
Tech Center
February 23, 2024
Securing Port 139: Strategies to Prevent Unauthorized Access and Cyber Threats
In the realm of network security, safeguarding communication ports is a fundamental aspect of protecting a network’s integrity and confidentiality. Port 139, primarily used by the Server Message Block (SMB) protocol for file sharing in Windows networks, stands out as a critical point… Read More
Tech Center
February 23, 2024
The Essential Guide to SMB Port Configuration for Enhanced Network Security
The Server Message Block (SMB) protocol is a critical component of Windows networking, facilitating the sharing of files, printers, and serial ports among devices on the same network. While SMB plays a pivotal role in enhancing operational efficiency and collaboration within organizations, its associated ports, especially Port 445,… Read More
Tech Center
February 23, 2024
Port 445: Understanding Its Role in Cyber Attacks and Strategies for Defense
Understanding the nuances of network ports can be the key to safeguarding your digital assets against unauthorized access and cyber attacks. Among these, Port 445 stands out due to its significant role in network communication and its notorious association with various cyber threats. Read More
Tech Center
February 23, 2024
Enhancing Your Cyber Defense: A Comprehensive Comparison of IDS vs IPS Technologies
An ever-expanding digital attack surface means that businesses and individuals alike must employ robust security measures to protect their sensitive data and networks. Two key technologies in the realm of cybersecurity are Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). While both… Read More
Tech Center
February 23, 2024
Integrating Defender for Identity Into Your Security Strategy: A Step-by-Step Guide
With cyber threats looming large and data breaches a constant threat, safeguarding your organization’s identity has never been more critical. Cybercriminals are employing increasingly sophisticated tactics to infiltrate networks and steal sensitive information, which is why having robust identity protection measures in place… Read More
Tech Center
February 22, 2024
Top 10 Cybersecurity Questions to Ask Your Vendors: A step-by-step guide to reduce supply chain risk
A cybersecurity vendor questionnaire is vital in assessing the competency and reliability of potential partners. It serves as a comprehensive tool to evaluate various aspects crucial for safeguarding sensitive data and infrastructure. Through detailed inquiries about security protocols, compliance measures, incident response plans,… Read More
Supply Chain Cyber Risk
Tech Center
February 22, 2024
Beating LockBit at its Own Game: Law enforcement’s takedown of a prolific ransomware group
After a years-long investigation, this week the FBI and law enforcement agencies in the UK and Europe took over the main website of the cybercrime group known as LockBit. Law enforcement additionally arrested LockBit associates in… Read More
Cyber Threat Intelligence
February 22, 2024
3 2 1… Impact! Early Results under the SEC’s Cybersecurity Governance Rule
In July 2023, the SEC adopted a new rule requiring disclosure of “material” cybersecurity incidents and detailed information on cybersecurity risk management, strategy and governance by public companies. With the new rule taking effect in December and annual reports due for public release and consumption in… Read More
Public Sector
Services
February 21, 2024
Chinese Hacking Group Targets US Critical Infrastructure
Earlier this month, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) issued a joint warning that the hacking group known as “Volt Typhoon” has been lurking in US critical infrastructure systems for at least five years. Who’s behind Volt Typhoon? … Read More
Cyber Threat Intelligence
February 20, 2024
Unveiling the Shadows: The Rise of Volt Typhoon and the New Age of Cyber Threats
In the intricate web of global cybersecurity, the emergence of hacking groups like Volt Typhoon represents a profound shift in the landscape of cyber threats. Operating from the shadows, these entities have escalated their activities, drawing the attention of cybersecurity experts and global watch dogs alike. … Read More
Cyber Threat Intelligence
February 16, 2024
The Human Factor in Cybersecurity
In the field of cybersecurity, there’s one constant that remains both the greatest asset and the most significant vulnerability: the human factor. While technological advancements continue to fortify digital defenses, human behavior remains a pivotal element in determining the success or failure of cybersecurity measure… Read More
Tech Center