FEATURED BLOG
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.
Protect Yourself From Social Engineering
Social Engineering tactics are hard to counter as they are constantly evolving. However, there are a number of ways your organization and employees can defend against social engineering.
How To Effectively Communicate Cybersecurity To The Board
CISOs must be able to clearly communicate cybersecurity to the board in today's evolving business and tech landscape. Here’s some suggestions to help you find success.
Password Cracking 101
Welcome to Password Cracking 101: All of the password cracking information that you need to start your journey.
Getting Started with Security Governance for SMBs
Getting Started with Security Governance for SMBs
New NYDFS Cybersecurity Regulations and How They Effect You
New NYDFS Cybersecurity Regulations? Are you prepared? Should you be?
5 Tools Attackers Hate in Corporate Environments
5 Tools Attackers Hate in Corporate Environments
Creating Better Passwords
Funny thing about passwords. They better they are, the more we hate them. In the constant struggle for security, IT faces off with users in the battle for a secure corporate enterprise. Taliy offers some practical advice you can implement today to improve your password enhancement adoption across the organization.
The Most Essential Security Measure You're Not Taking
Many people take a rather blasé approach to account security and identity theft. “I know I shouldn’t, but it’s fine” is a common refrain with regards to subpar security practices, such as password reuse. Tales of account compromise are met with a mentality of “that sounds scary, but it won’t happen to me”.... Until it does!
How to Bypass Azure Conditional Access
Attackers are using this trick to bypass conditional access rules in Azure. In this episode of the #7XFiles, Matt Barnett walks you through the tactic and the remediation necessary to close this gap in your environment.
Building A Password Cracker in AWS
Ever wanted to use all that AWS compute power for something fun? How about cracking passwords? In this post, I'll walk you through building a formidable cloud-hosted password cracking rig.
Linux Privilege Escalation Vulnerability (CVE-2021-3156)
A newly-discovered vulnerability allows for privilege escalation on the linux command line. BLUF: The exploit hasn't been released (yet) but the patch is out. So patch now (sudo 1.9.5p2).
Let's Talk Ransomware
Many organizations find themselves in a position where customers are asking for an independent certification”
Phishing, Ransomware, Breaches: Protect Your Organization
Securing our resources is critical. This blog will highlight what companies – both big and small – can do now, and in the future, to help protect their information assets.
Multifactor Authentication and You
Matt Barnett and Founder and CEO of Cyberblack, Brett Hodges, analyze the Colonial Pipeline attack in the weeks since the massive shutdown caused fuel prices to surge and incited panic buying across the country. This episode of the 7X Files digs into what we can learn from this attack and what can you do to ensure your organization isn’t the next victim.