Skip to main content

April 24, 2020

COVID-19: From the Mindset of the Attacker

We’ve seen lots of COVID-19-related work-from-home tips, but how has it affected the attacker?

See Details

January 31, 2018

Cloud Critical Controls

It’s no secret – organizations are moving to the cloud faster than their security teams can secure them. The daunting task of catching up to the secur...

See Details

July 31, 2017

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 20

Test the overall strength of an organization’s defenses (the technology, the process and the people) by simulating the objectives and actions of an at...

See Details

May 22, 2017

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 19

Protect the organization’s information, as well as its reputation, by developing and implementing an incident response infrastructure (e.g. plans, def...

See Details

November 18, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 16

Actively manage the lifecycle of system and application accounts – their creation, use, dormancy, deletion – in order to minimize opportunities for at...

See Details

November 04, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 14

The processes and tools used to track/control/prevent/correct secure access to critical assets (e.g., information, resources, and systems) according t...

See Details

October 21, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 13

Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

See Details

September 22, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 12

Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

See Details

July 27, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 10

The processes and tools used to properly back up critical information with a proven methodology for timely recovery of it.

See Details