Social engineering
How To Identify a Social Engineering Attempt Social engineering is a unique threat as it uses psychological means combined with […]
Internet of things
What Is The Internet of Things (IoT) The internet of things (IoT) is a pretty easy concept to understand however […]
What is Zero Trust
What is Zero Trust? The term, “Zero Trust” was coined by Forrester Research analyst and thought-leader John Kindervag, and follows […]
Supply Chain Attack
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less-secure elements in the supply […]
For those using Zoom conduct regular meetings with their staff, vendors, family or friends the sudden security shortcomings of Zoom’s […]
Corporate Information Technologies, a leading Managed Security Service Provider, today announced that its President and Chief Systems Engineer, Lawrence Cruciana […]
Critical Control 6 – Check your audit logs frequently Modern day attackers rely on the fact that such organizations rarely […]
Critical Security Controls – Control 5 – Configuration of the Operating System Critical Security Control 5 requires the creation of […]
Critical Security Control 4 – Controlled use of Administrative Access System admin level permissions seem to be everywhere. These permissions […]
CSC 3 – Continuous Vulnerability Management Computer networks are very similar to modern buildings; they are combination of numerous highly […]
Learn More
error: Alert: This Content is protected!