Infrastructure
July 9, 2019
If you do a Google search for products and services that can help your company be more secure, your Web browser might very well explode. The sheer number of results you’ll get — solutions...
If you are using a wireless keyboard or mouse on your computer, beware of the risk of getting mousejacked. Using this technique, attackers could take over your entire Active Directory in just minutes...
Cybersecurity
April 23, 2019
Whether you perform risk assessments for clients or your own organization, you know how daunting it can be to define and prioritize the risks you identify. Fortunately, security frameworks exist to...
Compliance
January 16, 2019
No matter what role you play in the audit process, the experience can be painful. If you’re an external consultant, you have to work with clients who have limited budgets and high expectations. And...