Ben CardFeb 125 minManual vs. Automated Penetration Testing: What You Need to KnowBoth methods have their advantages and disadvantages, and choosing the right one depends on several factors.
Ben CardSep 7, 20232 minIs AI Automation of Security Safe?AI is increasingly being used in cybersecurity to protect against cyberattacks, but is it safe?
Ben CardMay 1, 20232 minSevere Android Vulnerability Exploited by Chinese Actors1 of 2 vulnerabilities recently added to the U.S. Cybersecurity and Infrastructure Security Agency has seen evidence of active exploitation
Ben CardMar 6, 20234 minBest Practices for Effective Phishing Campaigns10 Things You Can Do To Improve Your Phishing Campaigns
Ben CardNov 29, 20223 minRansomware Attacks Increase During Holidays & Weekends--When Security Teams Are Least PreparedThe primary causes of costly security breaches—and longer investigation times—is a combination of insufficient SOC staffing and....
Ben CardNov 22, 20222 minNew Use of Windows Security Bypass for Malware DeliveryResearchers have found that a new phishing attack is able to take advantage of a Windows zero-day flaw to deliver malware.
Ben CardOct 27, 20224 minSecurity Awareness Training: A High-Value ProgramBuilding a robust security awareness training program can help mitigate expensive risks poses by cybercrime.
Ben CardSep 6, 20225 minTop 10 Things to Look for in a Pen Testing VendorWhat to Look for and what to Avoid When Choosing a Pen-testing Vendor or Provider
Greg JohnsonOct 19, 20211 minBLACKMATTER RANSOMWAREHow vulnerable are you? Even if you aren’t critical infrastructure, you too could be vulnerable.