How to secure our organization when our employees using different collaboration SaaS services? [closed]

Our employees use few SaaS collaboration applications (e.g project management). I was wondering what controls we should controls on the vendor we should put?

Example: Asana is a web and mobile application designed to help teams organize,… Continue reading How to secure our organization when our employees using different collaboration SaaS services? [closed]

What are the types of vulnerabilities that could result in exploits that do not require user interaction? [closed]

What are the existing types of vulnerabilities that could result in exploits that do not require user interaction (e.g. zero-click)? I’m trying to understand the type of zero-click attack type for us to plan proper mitigation in code.

Continue reading What are the types of vulnerabilities that could result in exploits that do not require user interaction? [closed]

What are some of malware-based MITM attacks that can compromise the organization when working remotely?

With the Coronavirus happening, employees use remote access to work remotely from not organizational laptop access to their VDI or remote access machine via company’s web portal (e.g. SSL Portal VPN). I was wondering if the laptop is infec… Continue reading What are some of malware-based MITM attacks that can compromise the organization when working remotely?