We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

Automating Penetration Testing With Bash
Join Principal Security Consultant Adam Compton to discover how Bash can automate penetration testing tasks by streamlining the tedious, simplify workflows,…

HIPAA Business Associates - What’s Your Function?
Many teams working with health care providers receive requests to sign a Business Associate Agreement. In this blog, we break down HIPAA’s definition of a…

Security Noise - Can You Wear a White Hat After Labor Day?
Episode 8.2

HIPAA Covered Entities - It’s More Than Just PHI
Handling health records doesn’t automatically make an organization a Covered Entity. In this blog, we help clear up common misconceptions so teams can better…

WSUS Is SUS: NTLM Relay Attacks in Plain Sight
Windows Server Update Services (WSUS) is a trusted cornerstone of patch management in many environments, but its reliance on HTTP/HTTPS traffic makes it a…

The One Step Most Organizations Miss with Active Directory
Join Identity Security Architect Sean Metcalf and Managing Director of Remediation Services Paul Sems to get perspective on how leading organizations are…

A Big Step on the CMMC Rollout Timeline
A major step on the CMMC rollout timeline was completed recently as the regulatory change that will create the CMMC contract clause made its way to the Office…

Detecting Active Directory Password-Spraying with a Honeypot Account
Password-spraying is a popular technique which involves guessing passwords to gain control of accounts. This automated password-guessing is performed against…

Security Noise - Hacker Summer Camp
In this episode, Geoff and Skyler speak with Senior Security Consultants David Boyd and Whitney Phillips about their experiences at DEFCON 33 and Black Hat…

HIPAA Protected Health Information - When Health Information Isn’t Protected
Many organizations don’t understand that not all health information is PHI and apply HIPAA more broadly than is required. This has implications for which…

Protecting Backup and Recovery in the Age of Ransomware
Ransomware attackers frequently target backups and recovery systems to force victims into paying ransoms, making robust protection strategies essential for all…

Maturing a Business Continuity Program: From Reactive to Resilient
During our next webinar, learn how to thrive through disruption and successfully align your Business Continuity Program (BCP) with the business' goals and risk…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
