Podcast 31 October 2023 EP26: Questionable Methods for Protecting Backups from Ransomware In today’s episode, we’re delighted to welcome back Eric Siron, who’s no stranger to our… Read More
Podcast 26 October 2023 EP25: Key Takeaways from our Ransomware Survey In today's digital landscape, ransomware threats have become an increasingly significant concern for organizations of… Read More
Security Awareness 24 October 2023 Detecting and Preventing Password Spraying Attacks Passwords are common ways of logging into the system, service, or application. They are typically… Read More
Security information 20 October 2023 Understanding the Adversary-in-the-Middle Attack – How It Works and How to Defend Against It An adversary-in-the-middle attack (formerly Man-in-the-middle, sometimes now referred to as Attacker-in-the-middle) is a type of… Read More
Podcast 18 October 2023 EP24: The Danger of Malicious OAuth Apps in M365 Malicious OAuth apps are an issue that has plagued M365 for many years. By default,… Read More
Security Awareness 16 October 2023 Mastering and Leveraging the MITRE ATT&CK Framework on Cyber Threat Detection The requirement to track and catalog typical TTPs (Tactics, Techniques, and Procedures) that APT (Advanced… Read More
Understanding Email Security Technologies and the Power of Hornetsecurity’s Hybrid Approach Email Security 11 June 2024 Read more
EP21: Life as a Cybersecurity CEO – An Inside Look Podcast 20 September 2023 In this week’s episode, Andy sits down with Daniel Hofmann, the CEO of Hornetsecurity, for… Read more
Remote Management Survey Security information, Surveys 12 January 2023 1 in 5 I.T. pros say remote workers are not secure, survey finds Read more