In today’s episode, we’re delighted to welcome back Eric Siron, who’s no stranger to our…
In today's digital landscape, ransomware threats have become an increasingly significant concern for organizations of…
Passwords are common ways of logging into the system, service, or application. They are typically…
An adversary-in-the-middle attack (formerly Man-in-the-middle, sometimes now referred to as Attacker-in-the-middle) is a type of…
Malicious OAuth apps are an issue that has plagued M365 for many years. By default,…
The requirement to track and catalog typical TTPs (Tactics, Techniques, and Procedures) that APT (Advanced…
To establish a workable budget and a practical plan, you will need to determine your…