How to Prevent Security Breaches from Third-Party Apps

How to Prevent Security Breaches from Third-Party Apps

Prevent security breaches from third-party apps Are we too trusting? Earlier this year, Security Magazine referenced a study revealing that 82% of companies allow third-party app vendors access to all their cloud data; 76% of companies give third-party app partners...
Value-Added Reselling, It’s What We Do

Value-Added Reselling, It’s What We Do

At the moment the world is abuzz, if you will pardon the pun, with COVID-19 and now the next threat in what seems like a monkey paw year, Murder Hornets. But with these seemingly apocalyptic natural occurrences, where does that leave infosec? What are we doing? How...
Password Rumble

Password Rumble

Passwords- the dark necessity of the world, the prize of many bad actors, the security measure that drives users and security professionals alike insane. Special characters, 16 characters, 8 characters, use a passphrase, don’t use a passphrase they are easily...
New Year, New Threats

New Year, New Threats

With the New Year well underway the biggest threats to cyber-security have already begun to rear their ugly heads. When combined with the cybersecurity skill shortages and the growth of development that occurs every day, 2020 is going to be in truth like every other...
Twas The Night Before Christmas And All Through The SOC

Twas The Night Before Christmas And All Through The SOC

‘Twas the night before Christmas and all through the SOC, not an analyst was stirring, not even in the NOC. The servers were all updated in fear for the preparation of holiday cheer. The CISO was nestled all snug in his bed, while a laptop was stolen with admin creds,...