Just in
The Colonial Pipeline Hacked and ransom paid
Two lessons in network securityRemote workers are more vulnerable than those in the office; Colonial Pipeline was NOT hacked from inside; it was hacked through the computer of the employee working from homePaying the ransom is wrong; keep your backups up to date.The...
Introducing Passwordless Authentication from Duo
Duo's upcoming passwordless authentication solution helps you s@y g00dby3 to Pa$$words — without compromising on security. What is Passwordless Authentication? Passwordless authentication is a method of verifying a person's identity when they access an application —...
BEC Taxonomy: Payroll Redirects
Last Time in the BEC Taxonomy Series… Proofpoint researchers in the second of the Business Email Compromise (BEC) taxonomy series began delving into the Theme tier of the Email Fraud Taxonomy framework (Figure 1), focusing on invoice fraud and demonstrating how the...
Threat Actors Exploit Microsoft and Google Platforms to Host and Send Millions of Malicious Messages
Organizations worldwide have adopted cloud collaboration tools in record numbers—and attackers have quickly followed. In recent months we have observed an acceleration in threat actors abusing Microsoft and Google’s popular infrastructure to host and send threats...
Qualys Brings its Market Leading Vulnerability Management Solution to the Next Level
Introducing VMDR - Vulnerability Management, Detection and Response VMDR delivers a continuous cycle of protection from a single pane of glass with built-in orchestration workflows and real-time vulnerability detection to prioritize, remediate and audit across hybrid...
The Latest in Phishing
Phishing Statistics and News Credential Phishing Attacks Quadrupled in Q3 2018 Proofpoint’s latest Protecting People: A Quarterly Analysis of Highly Targeted Attacks analyzes email attacks on Fortune Global 500 companies that took place from July to September 2018....

IT Consulting

Our services

Managed Service
