We share our expertise to make the world a safer place.
InfoSec moves at a rapid pace and sometimes it’s hard to keep up—that’s where we enter the chat.

Discover current cybersecurity insights
Get vital information straight from the experts, without all the noise.

Penetration Testing and Burnout
It's that feeling of your nerves being stretched like sinew over mounting expectations and due dates. When your attention keeps an exhausted but stubborn focus…

Defensive Backup Infrastructure Controls Framework
Use the Defensive Backup Infrastructure Controls framework to take a hard look at your organization's backup and recovery capabilities.

CMMC Level and Assessment Requirements for Defense Contractors
Many DoD contractors are struggling to understand what requirements will apply to them once CMMC rolls out. CMMC defines three levels, but CMMC Level 2 may…

Ask Me Anything – PCI DSS
Ask our experts anything about Payment Card Industry Data Security Standard (PCI DSS) during this live session! Our compliance team will help you understand…

Dealing With Unmarked and Mismarked CUI
Implementing CMMC and other Controlled Unclassified Information (CUI) protection obligations depends on the accurate identification of CUI, and in some cases…

The Proliferation of “Fake” CMMC Contract Clauses
Defense subcontractors may already be seeing CMMC clauses in their contracts, even though the CMMC contracting procedures and contract clause have yet to be…

PivotTables For InfoSec Dummies
Plenty of people know how to toss an IP address and port list into Excel for sorting and searching but don’t get a chance to take it to a deeper level. Excel…

Black Hat USA Training - Adversary Tactics and Threat Hunting
During our Black Hat training, you will learn hands-on attacks that directly correlate to industry relevant TTPs, while performing threat hunting exercises and…

Let's Clone a Cloner - Part 3: Putting It All Together
We have arrived at our final stage of metamorphosis, taking our pupa and morphing it into a hacking machine. Let's finish this journey. Geared Up Pupa In the…

Measuring Effectiveness for Business Resilience
Testing and assessing security effectiveness is a core component of business resilience. Learn why this type of testing can help ensure you're protecting your…

Why is this Finding on my Pentest Report?
Sometimes, one weak link is all it takes. In this blog, Joe Sullivan explains why even seemingly minor findings matter to help highlight best practices,…

Hiding in the Shadows: Covert Tunnels via QEMU Virtualization
Attackers are getting increasingly creative—not just with their payloads, but with how they deliver and operate them. In a recent Incident Response engagement,…
Loading...
Get our best blogs, latest webinars, and podcasts sent to your inbox.
Our monthly newsletter makes it easy to stay up-to-date on the latest in security.
