Author Posts: Heather Howland

Brute Force Attacks: Denying the Attacker, Not the User

According to haveIbeenpwned.com, close to 8 billion accounts have been compromised. The site  provides a tool to see if any...

How to Thwart an Attacker’s Attempt to Compromise Credentials and Move Around a Network

In the past year, we have seen numerous publicly traded corporations (Marriott and T-Mobile), airlines (Cathay Pacific and Delta), and...

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more...

You Failed Your Pen Test: How Can You Reduce Your Attack Surface?

Penetration testing is a critical best practice for virtually any organization’s cybersecurity posture. By putting defenses to the test against...

Cybersecurity is Increasingly Important for M&A Dealmakers

Corporate boards widely recognize due diligence as a critically important component of the M&A process, particularly when it comes to...