Category: User Behavior

Zero Trust for Hospital Devices

NCSAM Week 3 – Securing Internet-Connected Devices in Healthcare    I was pondering the NCSAM Week 3 directive – “The third week of Cybersecurity Awareness...
Read Now

Reducing Investigation Time: How to Quickly Parse True Positives

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the...
Read Now

Disrupting an Attacker from Exploiting Domain Credentials

Security professionals often feel they don’t have enough time to keep up with modern threats. In fact, Crowdstrike researchers have...
Read Now

Conditional Access Establishes Trust In the Network

Stolen or compromised credentials pose well-known risks to organizations and their employees. And as hackers and other malicious actors become more...
Read Now

Happy Holidays! Here’s your Business Email Compromise (BEC) gift card scam

Deck the hall with sad employees, Fa, la, la, la, la, la, la, la, la!  'Tis the season to be swindled, Fa, la,...
Read Now