Similar Posts
A Secure Replacement for Passwords
Passkeys will ultimately replace passwords. How soon is unclear because 2 billion websites need to be upgraded to support it and the vendors still have some kinks to work out. But it will happen and you need to learn about it and start playing with it. Learn more here:
Why Dark Web Monitoring Is Critical
The dark web is where most of the content is illegal and most of the traffic is about how to do illegal deeds. It is also where, for example, credentials to the Los Angeles School District network were available for sale prior to the ransomware attack on the district’s network earlier this month. Likely the…
Add 20-30 Points to Your SPRS Score
For those of you who are DoD contractors (and even if you are not), here is one thing that you can do that will improve your security program and, if you are a DoD contractor, will add 20 or more points to your NIST SP 800-171 SPRS Score. Audio Video
Security of Network Devices with Public Management Interfaces
CISA, the Cybersecurity and Infrastructure Security Agency released a directive, which is binding on federal civilian executive branch agencies, that addresses the security of network and operational technology (OT, IoT) devices which can be managed from the public Internet. Learn what CISA and we are recommending below.
MFA Fatigue – What is it and How to Protect Yourself
MFA Fatigue is a relatively new attack method and is a way to try and get around MFA security. Learn what it is and how to protect yourself and your company against it, here. Audio Video
Will You be the Last to Know?
External attack surface management tools (EASM) allow anyone to get a sense of your security prep without your permission or even your knowledge. Who uses EASM tools? Your competitors against you, your customers to decide if they want to do business with you, members of the public, your insurance carrier to decide if they want…