Attack Surface Management 101

An attack surface encompasses all of the potential entry points in an organizational infrastructure that could provide threat actors with a pathway to  assets that store or process sensitive or business-critical data. Though there is no way to completely eliminate your attack surface, attack surface management strives to take discover and monitor the attack surface in […]

Read More… from Attack Surface Management 101


Dissecting Ransomware: Understanding Types, Stages, and Prevention

New, emerging ransomware attack methods impact organizations every day.  Even though ransomware attacks are changing, it’s more likely cybercriminals will use tried and true methods that are already proven to be effective.  When it comes to ransomware attacks, low effort and  high value tactics are easy to implement and very lucrative. Preventing ransomware is more […]

Read More… from
Dissecting Ransomware: Understanding Types, Stages, and Prevention

Video: A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions

After years of growing in importance, cybersecurity took center stage in 2022, with cyberattacks not only continuing to cause global disturbances, but also becoming the focus of legislation, organizational planning, news coverage, and even major plot points on tv. Amidst the flurry of activity, common themes have emerged regarding cyber threats and the way respond […]

Read More… from Video: A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions

What is a Supply Chain Attack and How Can Organizations Defend Against Them? 

Supply chain attacks were responsible for 62% of system intrusion incidents, according to Verizon’s 2022 Data Breach Investigations Report. This type of attack is one of the most effective ways to compromise organizations because it targets the weakest link in the security chain. Supply chain attacks usually begin by compromising a supply chain partner, such as […]

Read More… from What is a Supply Chain Attack and How Can Organizations Defend Against Them? 

What is the Relationship Between Ransomware and Phishing? 

Ransomware and phishing are usually put in two separate categories when cyberattack methodologies are discussed. However, ransomware operators are increasingly leveraging phishing tactics to deploy their malicious payloads, and the potential for compromise is exponentiating as a result.   Ransomware and Phishing – a match made in heaven  Phishing is the number one delivery vehicle for ransomware, states risk management firm Deloitte. Industry sources agree, and […]

Read More… from What is the Relationship Between Ransomware and Phishing? 

A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions

In 2022, geopolitical unrest and an expanding online attack surface contributed to the emergence of several themes across the cyber landscape. Infrastructures associated with opposing ideologies were highly targeted, with government agencies, supply chains, and IOT devices falling victim to high-profile campaigns. Cybercriminals launched increasingly advanced attacks on vulnerable entities, with DDoS, ransomware, and hacking […]

Read More… from A Spotlight on Cybersecurity: 2022 Trends and 2023 Predictions

Why Is Black Box Fuzzing Important in Key Industries? 

Black Box Fuzzers  Black box fuzzers attack code vulnerabilities the same way a real-world cybercriminal would so you can find code weaknesses before they are exploited. A form of dynamic application security testing (DAST), this tool attacks from outside the application code, using a wide range of malformed or partial code data injections to find unexpected code input […]

Read More… from Why Is Black Box Fuzzing Important in Key Industries? 

Fortra Acquires Outflank

Outflank’s trusted experts run sophisticated attack scenarios supported by a unique SaaS offering that help global businesses pinpoint and address dangerous IT vulnerabilities. ​ MINNEAPOLIS (September 1, 2022)—Fortra announced today the acquisition of Outflank, a well-regarded IT security leader with deep expertise in adversary simulation; specialist cyber security trainings; and a unique cloud-based software offering for […]

Read More… from Fortra Acquires Outflank