Blogs

Blog Image

Local Privilege Escalation Vulnerability Discovered in VMware Fusion

Summary:
VMware Fusion contains a local privilege escalation vulnerability that allows an attacker to inject a malicious path into the system-wide PATH environment variable.

Versions Tested:
VMware Fusion Professional v15.5.5

Blog Image

The Democratization of Security

How Permissions Elevate both Transparency and Efficiency to Build Healthier Security Relationships

Blog Image

Electronic Voting: 3 Ways to Strengthen Election Security

It is no secret that wildly different political views aside, the threat of foreign and even domestic interference in the 2020 U.S. presidential elections is dominating our politics in advance of November.

At its core, the subject of election security comes down to one key question: How secure is your vote?

Blog Image

CRITICALSTART & ePlus | National Cybersecurity Awareness Month Podcast

https://www.youtube.com/watch?v=0-bM8SsoQbM&feature=emb_logo

Full Transcript:

Blog Image

How to Develop a Cybersecurity Playbook in 5 Steps

A well-organized cybersecurity playbook can be the difference between an incident that’s contained, analyzed, and reported, or one that becomes a wake-up call.
Blog Image

Exploiting Enterprise Passwords

https://www.youtube.com/watch?v=qK59hKqL3xw&feature=emb_logo

No matter how much you think you’ve done to safeguard your data and systems against brea

Blog Image

[2020 Updates] Gartner Endpoint Security Hype Cycle Insights

Gartner recently released their 2020 Hype Cycle for Endpoint Security, and the focus is crucial to the security defense, successful implementation, and daily operation of businesses everywhere, especially now.

Blog Image

SIEM & MDR: What You Need to Know

A defense-in-depth security strategy is built upon the premise that no one tool or process is enough to ensure the protection of an organization’s entire technology infrastructure.

But if there is one layer that should be considered foundational to any effective cybersecurity strategy, it is Security Incident and Event Management (SIEM).

Blog Image

Benefits of Security Orchestration, Automation, & Response (SOAR)

With threats to network security increasing in sophistication and expanding the roster of entry points to include the ever-growing list of cloud-based services and applications that they can use to launch an attack, security analysts need to constantly adapt through new tools to collect data and monitor events.

Literally thousands of alarms through different monitoring solutions might need to be manually monitored, and that’s simply too much for a team to manage.

Blog Image

A New MDR Managed SIEM Offering Powered by Devo

By Rob Davis, CEO of CRITICALSTART