FEATURED BLOG
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.
How to Bypass Azure Conditional Access
Attackers are using this trick to bypass conditional access rules in Azure. In this episode of the #7XFiles, Matt Barnett walks you through the tactic and the remediation necessary to close this gap in your environment.
Hacking the Pipeline Ft. Brett Hodges of Cyberblack
Matt Barnett and Founder and CEO of Cyberblack, Brett Hodges, analyze the Colonial Pipeline attack in the weeks since the massive shutdown caused fuel prices to surge and incited panic buying across the country. This episode of the 7X Files digs into what we can learn from this attack and what can you do to ensure your organization isn’t the next victim.
7 Steps to Secure Your Cloud
If you are just getting into the cloud or finally circling back around to your cloud's security, Matt Barnett offers 7 (of course) tips to help get you started.
Multifactor Authentication and You
Matt Barnett and Founder and CEO of Cyberblack, Brett Hodges, analyze the Colonial Pipeline attack in the weeks since the massive shutdown caused fuel prices to surge and incited panic buying across the country. This episode of the 7X Files digs into what we can learn from this attack and what can you do to ensure your organization isn’t the next victim.