Category: Threat Mitigation

NTLM Reflection Attack? Not for Preempt Customers

NTLM strikes again! Microsoft released a patch this week, CVE-2019-1384, which addresses a bypass vulnerability that allows attackers to successfully...
Read Now

Webcast: Achieving Conditional Access That Protects Every Account In Your Hybrid Environment

Organizations adopting cloud services face challenges of visibility and control that can lead to unauthorized access, and therefore widen the...
Read Now

Reducing Investigation Time: How to Quickly Parse True Positives

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the...
Read Now

Happy Holidays! Here’s your Business Email Compromise (BEC) gift card scam

Deck the hall with sad employees, Fa, la, la, la, la, la, la, la, la!  'Tis the season to be swindled, Fa,...
Read Now

You Failed Your Pen Test: How Can You Reduce Your Attack Surface?

Penetration testing is a critical best practice for virtually any organization’s cybersecurity posture. By putting defenses to the test against...
Read Now