Blogs

Data Privacy Program from Zero to Hero
As I promised last week, here’s a short article on Developing and Implementing a Data Privacy Program. I hope you will like it and share it with your teams and colleagues.

Balancing Act: How MOBILESOC can Ensure Cybersecurity while Protecting Time with Family

By Tommy Scott, Senior Security Consultant | CRITICALSTART

Windows Security Event Logs – What to Monitor?
The following is a table of event codes that I’ve found to be extremely valuable to log and monitor in an environment. Some trend more towards general environment health and activity monitoring, however they all have a foothold in security value as well. As always, your environment’s needs and requirements will be different depending on a multitude of other factors such as compliance and log retention, and these should be taken into consideration when choosing what to log – and for how long.

How To Reverse Engineer the SolarWinds Hack
Author: Quentin Rhoads-Herrera, Director of Professional Services

Second Round of Stimulus Provides New Opportunity for Online Scams
This week, Americans nationwide will begin receiving their second round of COVID-related stimulus checks. And just like with the first round, online scammers and malicious actors will no doubt be attempting to scam them out of their money.

Sunburst: A Week in Review
2020 isn’t going down quietly, and what an awful week it has been for the security community. If you were lucky enough to be on vacation, let’s catch up.

Weighing the Value of Managed Security
A shortage of skilled personnel is one of the most serious issues affecting security managers today. Add in challenges in maintaining a complete Security Operations Center (SOC) and the result can be gaps in cyber defense. Managed Detection and Response (MDR) services offer a viable, economical way to counter these drivers of risk.

Death to Vulnerability Management As We Know It
Vulnerability Management concepts are changing. The idea that vulnerability management is limited to scanning alone is being replaced with a wider and more comprehensive view. It’s now transforming to a concept called vulnerability identification, which is an umbrella for any type of service or activity centered around identifying vulnerabilities.

Steps Educational Institutions Are Taking to Defend Their Infrastructures from Cyber Attackers

Just when we thought 2020 couldn’t get any worse, cyber attackers are finding new ways to capitalize on our highly technology-dependent society.

Once More Unto the Breach: An Exploration into Breach Prevention and Response

Organizations continue to learn the hard way that cybersecurity breaches can happen for many reasons at companies of any size and maturity level.

Multiple Vulnerabilities Discovered in Aviatrix

Versions Tested:

The Democratization of Security: Simplification and Direction for Content Management
Last week, we talked about how life could be made easier through the democratization of security permissions and access. In particular, we discussed how Microsoft Azure Active Directory (AAD) simplifies user onboarding. There’s a second component to the Democratization of Security that can take this streamlining process even further.