logo
February 18, 2025 | Dirk Schrader

Understanding the Brute Force Attack Playback and Defense Strategy

Introduction to Brute Force Attacks A brute force attack is a trial-and-error technique used by cybercriminals to gain access to sensitive information such as passwords, encryption keys, or login credentials. Essentially, it involves systematically attempting every possible password combination...
February 14, 2025 | Dirk Schrader

An Overview of the MGM Cyber Attack

If you have ever been to a Las Vegas casino, then you know that they are literally money-making machines as people bet money on a variety of games on a continuous basis. Modern casinos exemplify digitally transformed businesses, with customers engaging through multiple digital channels, from...
January 29, 2025 | Dirk Schrader

A Comprehensive Guide to Healthcare Cybersecurity

The healthcare industry faces a unique and urgent challenge in the ever-evolving world of cyber threats. As businesses across sectors fortify their digital defenses, healthcare stands out as a critical target due to its reliance on interconnected devices and vast repositories of sensitive patient...
January 14, 2025 | Jonathan Blackwell

PowerShell Environment Variables

Introduction to PowerShell Environment Variables Environment variables are predefined variables in an operating system, they are available in the form of key-value pairs which store important system-level or user-specific information, such as paths, user configurations, and system settings....
November 29, 2024 | Dirk Schrader

A Comprehensive Look into Password Attacks and How to Stop Them

There are some things you want to keep private such as your bank account number, government ID number, etc. In the digital age, that includes the passwords that protect these accounts because once your account credentials are compromised, cybercriminals can get that information. That is why...
October 30, 2024 | Kent Tuominen

SAML vs OAuth Comparison: Similarities & Differences

SAML (Security Assertion Markup Language) and OAuth (Open Authorization) are two of the most common user authentication and authorization protocols. Both of them help manage identity and access using tokens, but they serve different purposes and operate in different contexts. This blog explains...
October 11, 2024 | Mark Techa

Understanding Common Ports Used in Networks for TCP and UDP Usage

Introduction to Network Ports What is a network port? Think of a port as a virtual gateway that a specific service, process, or application on your computer uses for network communication. Each port is assigned a unique number, allowing different types of traffic to be directed to the...
October 8, 2024 | Dirk Schrader

How to Prevent Cyber Attacks: Strategies and Best Practices

Introduction to Cyber Attack Prevention In today's digitally connected world, any organization with digital assets and internet access is vulnerable to cyberattacks. That reality has become all too pervasive in recent years. While it may not be part of your business plan, protection against...
September 27, 2024 | Mark Techa

What are SMB Ports, Port 139 and Port 445?

Organizations are increasing their use of various solutions to address communication needs across their infrastructure. As file systems are an integral part of collaboration, this article will dive into one of the most widely used protocols necessary for many systems. We will learn more about the...
June 25, 2024 | Kevin Joyce

SMBv3 Vulnerabilities Explained

Workplaces have evolved. While hybrid and remote work existed before COVID-19, these working arrangements became even more prevalent during and after the pandemic. Today, workplaces offer the flexibility for employees to work and access company resources from anywhere worldwide, with the Server...
Show more articles
...