Home » Tech

Category: Tech

Post
How Network Traffic Can Mask A Serious Cyber Threat

How Network Traffic Can Mask A Serious Cyber Threat

our network is always moving. Data flows from place to place, between all the endpoints that require rapid internet access. But like any traffic, this data can become congested – and some of it can be dangerous.  You never quite know what is hidden in your network traffic until it strikes your device with a...

Post
Can Cybersecurity be Automated?

Can Cybersecurity be Automated?

Cybersecurity is time- and resource-intensive. The threat landscape continues to evolve, and security analysts are feeling burnt out. According to research, 54% of security operation center (SOC) teams say that they are drowning in alerts, and 55% are not confident that they can prioritize alerts or respond effectively. Effective cybersecurity requires organizations to have the people,...

Post
5 Common Indicators of a Phishing Attempt

5 Common Indicators of a Phishing Attempt

Phishing is one of the most common and effective cybersecurity attack vectors, accounting for roughly a quarter of all ransomware attacks between 2019 and 2021, according to research from Cloudian. As businesses settle into permanent hybrid and virtual work environments in the wake of the COVID-19 pandemic, protecting sensitive data from phishing attacks is top of the...

Post
2019: The Rise of the Government Data Breach

2019: The Rise of the Government Data Breach

Data breaches are forever becoming more a part of everyday life in the United States. Hardly a day goes by when you can’t watch the news, read on the internet about another company having their networks breached by cybercriminals. Billions of records are exposed to hackers every year, 2019 was no exception. Though many Americans...

Post
Hacking WordPress: Building the Lab

Hacking WordPress: Building the Lab

Hello all and welcome to the first episode of the Hacking WordPress series. With this series, I will be putting together a series of videos and articles that will comprise a set of tutorials to show you the ins and outs of building a home lab that will give you the flexibility to test, hack,...

Post
10 Steps to Creating a Secure IT Environment

10 Steps to Creating a Secure IT Environment

Every day, as a part of my work at AlienVault, I talk to prospective clients. Many of them are trying to put together a security plan for their business. Most of the people I talk to are IT professionals who, like everyone else, are learning as they go. During my time in IT and the...

Post
The Internal Cyber Kill Chain Model

The Internal Cyber Kill Chain Model

Figure A. In military parlance, a “Kill Chain” is a phase-based model to describe the stages of an attack, which also helps inform ways to prevent such attacks. These stages are referred to as: Find Fix Track Target Engage Assess Ideally, the further towards the beginning of the Kill Chain an attack can be stopped,...

  • 1
  • 2