FEATURED BLOG
Cybersecurity Framework Assessments: Prioritizing Your Remediation
Cybersecurity framework assessments often reveal numerous gaps, leading to a need for prioritization. This blog explores how to rank and address these issues based on risk analysis, business objectives, and available resources.
Securing the Supply Chain
Integrate security into every phase of the supply chain and software development to protect against evolving cyber threats in an increasingly connected world.
The Cost of Physical Security Testing: An In-Depth Analysis
How much 'should' it cost to engage a security firm to test your physical security controls and through what methods?
5 Tools Attackers Hate in Corporate Environments
5 Tools Attackers Hate in Corporate Environments
The Most Essential Security Measure You're Not Taking
Many people take a rather blasé approach to account security and identity theft. “I know I shouldn’t, but it’s fine” is a common refrain with regards to subpar security practices, such as password reuse. Tales of account compromise are met with a mentality of “that sounds scary, but it won’t happen to me”.... Until it does!
Protect Yourself from the Under-the-Door Tool
An introduction to the Under-The-Door tool and how to protect against it.
How to Bypass Azure Conditional Access
Attackers are using this trick to bypass conditional access rules in Azure. In this episode of the #7XFiles, Matt Barnett walks you through the tactic and the remediation necessary to close this gap in your environment.
Hacking the Pipeline Ft. Brett Hodges of Cyberblack
Matt Barnett and Founder and CEO of Cyberblack, Brett Hodges, analyze the Colonial Pipeline attack in the weeks since the massive shutdown caused fuel prices to surge and incited panic buying across the country. This episode of the 7X Files digs into what we can learn from this attack and what can you do to ensure your organization isn’t the next victim.
7 Steps to Secure Your Cloud
If you are just getting into the cloud or finally circling back around to your cloud's security, Matt Barnett offers 7 (of course) tips to help get you started.
Deconstructing The Pen Test
Penetration tests are an invaluable tool for organizations. However, they’re often confused, misused, and mean different things to different people.