Active Directory Hardening: Best Practices and Checklist
As cyber threats continue to be more sophisticated, the need for active directory security becomes paramount. […]
Automate Everything With Python and Bash
Hey there! You ever think about how amazing it would be to just automate your life […]
 
																		Do boards understand their new role in cybersecurity?
Julie Ragland was CIO of vehicle manufacturing company Navistar, and has held IT leadership roles at […]
 
																		How cybersecurity red teams can boost backup protections
Cybersecurity red teams are known for taking a more adversarial approach to security by pretending to […]
 
																		SpyCloud Unveils Massive Scale of Identity Exposure Due to Infostealers, Highlighting Need for Advanced Cybersecurity Measures
Research indicates that an infostealer malware infection is often a precursor to a ransomware attack SpyCloud, […]
 
																		Australian cops bust underworld app through compromised software updates
Australia’s Federal Police (AFB) said it hacked into a dedicated encrypted communication platform, Ghost, to dismantle […]
 
																		Personhood: Cybersecurity’s next great authentication battle as AI improves
CISOs may be intimately familiar with the dozens of forms of authentication for privileged areas of […]
 
																		Cybersecurity vet Madison Horn makes her bid for US Congress
It’s safe to say that Madison Horn is the only candidate for US Congress in history […]
 
																		Microsoft fixes Authenticator design flaw after eight years overwriting accounts
Having ignored user complaints about a security design flaw within Microsoft Authenticator for eight years, Microsoft […]
 
																		Warning to ServiceNow admins: Block publicly available KB articles
Many organizations using ServiceNow are inadvertently exposing sensitive personal and corporate data through misconfigured Knowledge Base […]
