Attacks

Insider Threats: Protecting Your Organization from Within

Organizations today face an ever-growing threat landscape that extends beyond external attacks. Insider threats, originating from within the organization, pose a significant risk to the security and integrity of sensitive data and assets. Understanding and mitigating these threats is crucial for safeguarding the organization’s operations, reputation, financial stability, and others. Insider threats refer to the […]

Insider Threats: Protecting Your Organization from Within Read More »

The MITRE ATT&CK FRAMEWORK

The MITRE ATT&CK Framework is a collection of techniques used by attackers during a breach. The ATT&CK breaks down the techniques into the following tactics:  Initial Access – Techniques that use various entry vectors to gain a foothold. Footholds gained through initial access may allow for continued access, like valid accounts and use of external

The MITRE ATT&CK FRAMEWORK Read More »

National Computer Security Day

Held annually every 30th of November is the National Computer Security Day. A celebration that began in 1988 at a time that computers were becoming commonplace. This Day was created to raise awareness about cyber security issues and ways to keep all electronic devices and data protected from potential threats. Today, the internet and computers

National Computer Security Day Read More »

What is OWASP?

The Open Web Application Security Project (OWASP) is a non-profit organization focused on improving the safety of software. It was founded in 2001 by Mark Curphey. OWASP features a range of tools it uses, methodologies, and libraries to see web application security to seek out security vulnerabilities in web applications. They even have documentation guidelines

What is OWASP? Read More »