, , ,

How to configure warning messages for Office 365 emails from external senders

As a security precaution, it’s a good idea to remind your staff…

A Vulnerability Scan is NOT a Penetration Test (Pentest)

What is the difference between a Penetration Test and a Vulnerability…

The Zenis Ransomware Variant Goes the Extra Mile

Overview Ransomware is a type of malware that infects a computer…
security incident response

Best Practices for Service Account Management

Service Account Management We spoke previously on the management…
security incident response

Best Practices for Privileged Account Management - Part 1

Basic Privileged Account Management Abused and Misused privileges…

WannaCry - Worldwide Ransomware Attack - Updated

A widespread ransomware attack has spread across the globe infecting…
security incident response
, , ,

Security Incident Case Study – A MSSP Run Amok

This is a case study of a security incident that occurred recently.…
security incident response
, , ,

Law Firm Breach Used for Insider Trading Profit

Three Chinese citizens are charged for insider trading after…