Social engineering
How To Identify a Social Engineering Attempt Social engineering is a unique threat as it uses psychological means combined with […]
What is Zero Trust
The term, “Zero Trust” was coined by Forrester Research analyst and thought-leader John Kindervag, and follows the motto, “never trust, […]
Supply Chain Attack
A supply chain attack is a cyber-attack that seeks to damage an organization by targeting less-secure elements in the supply […]
For those using Zoom conduct regular meetings with their staff, vendors, family or friends the sudden security shortcomings of Zoom’s […]
Corporate Information Technologies, a leading Managed Security Service Provider, today announced that its President and Chief Systems Engineer, Lawrence Cruciana […]
Critical Control 6 – Check your audit logs frequently Modern day attackers rely on the fact that such organizations rarely […]
Critical Security Controls – Control 5 – Configuration of the Operating System Critical Security Control 5 requires the creation of […]
Critical Security Control 4 – Controlled use of Administrative Access System admin level permissions seem to be everywhere. These permissions […]
CSC 3 – Continuous Vulnerability Management Computer networks are very similar to modern buildings; they are combination of numerous highly […]
systems monitoring
Critical Security Controls – What’s installed, running, and able to run on your business computers Critical Security Control 2 advances […]
Learn More
error: Alert: This Content is protected!