Cyber Security Articles & News

6 Types of Social Engineering Attacks

Social engineering attacks account for a massive portion of all cyber attacks, and studies show that these attacks are on the rise. According to KnowBe4, more than 90% of successful hacks and data breaches start with a common type of social engineering attack called phishing.  

Read More >
Decoding Pentesting Report Lingo: The Ultimate Glossary

You know that penetration tests are important to run— and that more and more companies are integrating them into their annual cybersecurity initiatives.

Read More »
What is Multi-Factor Authentication & How Does it Work?

It seems that everything we use these days requires a password. From email and social media accounts to everything in between, we always need a password to gain access. 

But it isn't as simple as just coming up with one password and using it for everything. At least, it would be best if you weren't doing that...

Read More »
How Social Engineers Use Your Digital Footprint Against You

Think of all the publicly accessible information about your business that’s published on the web— from your corporate social media accounts to your very own website. 

Read More »
What’s It Like to Work With a Computer Security Expert Witness?

Uh oh. Somehow you’ve found yourself in the middle of a security breach— and worse still, in legal trouble because of it. 

Read More »
Red Team Operations vs. Penetration Testing

It’s another new year, and another opportunity to tighten your ever-important security

With the threat landscape constantly evolving, you don’t need us to tell you that an annual penetration test is a must. 

Whether you’ve run one or two pentests before and are looking to up the ante, or you’ve got quite a few reports under your belt, you may be wondering about this other pentest test you’ve heard about: a Red Team operation. 

In this post, we’re stacking the traditional penetration test up against the esteemed Red Teaming methodology to see if your company is the right fit for a Red Team engagement.

Read More »
How to Find Cybersecurity Speakers for Your Digital Event

This past year, event planners have made a huge shift in the way they host events. With the COVID-19 pandemic forcing events to go digital, bookers quickly left their old on-stage talent behind to focus exclusively on hosts experienced in online webinars, presentations, social events and workshops.

As you’ve probably come to realize, hosting a virtual speaker is an entirely different ballgame than organizing an in-person event. But one thing that hasn’t changed is the demand for high-quality talent to engage your audience. In fact, it’s even more crucial to find a presenter with charisma and knowledge that translates from stage to screen. 

Read More »
The Anatomy of a Penetration Testing Report [An Infographic]

Experts across a myriad of industries will defend the value of performing a routine penetration test, but not all pentests are created equal. 

Read More »
How a Cybersecurity Speaker Can Provide Value in 2021

Another year has come and went. But this time, many of us are more than glad it’s finally over! 

Read More »
6 Questions IT Directors Should Ask When Choosing Penetration Testing Services

As the head of IT, you know the value of a thorough penetration test

If only finding the right pentesting company were easy. 

Read More »