To what extent should we defend against leaked credentials being tested against our system?

We see these kinds of attempts with some frequency. Normally a leak has happened from some other 3rd party, and an attacker has a big list of known account + password combinations that they can try against other systems. They… Continue reading To what extent should we defend against leaked credentials being tested against our system?

The Journey to Hijacking a Country’s TLD – The Hidden Risks of Domain Extensions

I will liken him to a wise man, who built his house on a rock. The rain came down, the floods came, and the winds blew, and beat on that house; and it didn’t fall, for it was founded on the rock. Everyone who hears these words of mine, and doesn’t do them will be… Read More Continue reading The Journey to Hijacking a Country’s TLD – The Hidden Risks of Domain Extensions

What is the key to detecting all IoT devices in your organization? [closed]

In recent news, IoT devices are a target of hackers — specifically botnet herders. The first step to securing your organization and its users is to detect all IoT devices that are functional on your IP address range. If ever… Continue reading What is the key to detecting all IoT devices in your organization? [closed]