Social engineering attacks account for a massive portion of all cyber attacks, and studies show that these attacks are on the rise. According to KnowBe4, more than 90% of successful hacks and data breaches start with a common type of social engineering attack called phishing.
Decoding Pentesting Report Lingo: The Ultimate Glossary
You know that penetration tests are important to run— and that more and more companies are integrating them into their annual cybersecurity initiatives.
What is Multi-Factor Authentication & How Does it Work?
It seems that everything we use these days requires a password. From email and social media accounts to everything in between, we always need a password to gain access.
But it isn't as simple as just coming up with one password and using it for everything. At least, it would be best if you weren't doing that...
How Social Engineers Use Your Digital Footprint Against You
Think of all the publicly accessible information about your business that’s published on the web— from your corporate social media accounts to your very own website.
With the threat landscape constantly evolving, you don’t need us to tell you that an annual penetration test is a must.
Whether you’ve run one or two pentests before and are looking to up the ante, or you’ve got quite a few reports under your belt, you may be wondering about this other pentest test you’ve heard about: a Red Team operation.
In this post, we’re stacking the traditional penetration test up against the esteemed Red Teaming methodology to see if your company is the right fit for a Red Team engagement.
How to Find Cybersecurity Speakers for Your Digital Event
This past year, event planners have made a huge shift in the way they host events. With the COVID-19 pandemic forcing events to go digital, bookers quickly left their old on-stage talent behind to focus exclusively on hosts experienced in online webinars, presentations, social events and workshops.