Don't let mistakes bother you

If you don't care, you may become a victim of spam

6 things hackers know that they don’t want security pros to know that they know

Security professionals have good insights into the technical tactics, techniques, and procedures (TTPs) that threat actors […]

The Role of Deception in Securing Active Directory

Introduction 90% of businesses around the world use Active Directory as their primary Directory Service.  It […]

WeSecureApp is Now Strobes: A Message from Our CEO

Hello everyone, I’m excited to share some big news with you today. WeSecureApp is evolving into […]

Cloud providers must own up to their part in the current state of insecurity

The shared responsibility model has been foundational to cybersecurity from the start. But modern developments and […]

How to ensure cybersecurity strategies align with the company’s risk tolerance

Aligning an organization’s appetite for risk with cybersecurity strategies is a critical challenge CISOs face, one […]

North Korean hackers actively exploited a critical Chromium zero-day

A zero-day flaw in open source browser, Chromium, which was patched recently, was exploited by a […]

Ransomware recovery: 8 steps to successfully restore from backup

According to a Sophos survey of 5,000 IT and cybersecurity leaders released in April, 59% of […]

A Beginner’s Guide To Passive Reconnaissance Techniques And Tools

We all have heard the term “passive reconnaissance” but again what does it actually mean. Wait, […]

Women in Cyber Day finds those it celebrates ‘leaving in droves’

The information security industry has been trying for years to improve the participation of and respect […]

The Role of Network Forensics in Identifying Threats

The outlook of cyber threats in this modern cyber warfare theater has changed a great deal. […]