Security for the Modern OT Environment

Operational Technology (OT) – the hardware and software that’s used to monitor, detect and control changes to devices, processors and events of industrial equipment are popular targets for cyber attackers…and for good reason. Unauthor… Continue reading Security for the Modern OT Environment

The Friday 15: All About PAM in 15 Minutes

As a security professional, you’re busier than ever, juggling work, life and everything in between. With convenience being of the utmost importance to us these days, we are excited to launch The Friday 15.  This…
The post The Friday 15: Al… Continue reading The Friday 15: All About PAM in 15 Minutes

Reduce Risk with CyberArk and Rapid7 Integrations

It’s well-known in the world of cybersecurity that you can’t secure what you don’t know exists. With today’s evolving threat landscape, it’s never been more of a challenge or a necessity to be able to…
The post Reduce Ri… Continue reading Reduce Risk with CyberArk and Rapid7 Integrations

Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams

Executive Summary As more and more business is conducted from remote locations, attackers are focusing their efforts on exploiting the key technologies – like Zoom and Microsoft Teams – that companies and their employees depend…
The post … Continue reading Beware of the GIF: Account Takeover Vulnerability in Microsoft Teams

Know thy Enemy: Threat Analytics Boosts PAM Effectiveness

“Every battle is won before it is fought” ― Sun Tzu, The Art of War The Art of War, Chinese Philosopher Sun Tzu’s treatise on military strategy, is one of the most influential texts in modern…
The post Know thy Enemy: Thr… Continue reading Know thy Enemy: Threat Analytics Boosts PAM Effectiveness