Author: The CISO Perspective
-
How Exploits Work In cybersecurity, the term “exploit” is used to represent a piece of code, data or sequence of commands that takes advantage of…
-
What is AIOPs? Artificial Intelligence for IT Operations, or AIOps, is a term coined by Gartner to describe a class of technology that utilizes machine…
-
Hacking 2FA and MFA When MFA is implemented correctly, it can be an extremely powerful and low-cost way to protect against the weakest link in…
-
EDR and XDR: What Do They Do? Dwell time refers to the length of time an attacker is able to roam free on your network…
-
What is Machine Learning? Machine learning has been referred to as “the science of getting computers to act without being explicitly programmed.” What is machine…
-
What is OSINT? In “Breaking the Kill Chain: A Defensive Approach,” we took a look at the seven steps an attacker generally goes through in…
-
Active Reconnaissance The cybersecurity kill chain by Lockheed Martin walks us through the seven sequential steps an attacker will commonly follow during an attack. Previously,…
-
Secure Access Service Edge, or SASE, is a term coined by Gartner that combines multiple network and security technologies into a single offering. The goal…
-
You may not be familiar with web beacons, but chances are you interact with them every day and don’t even know it. Web beacons are…
-
The 2024 Verizon DBIR analyzes over 30,000 security incidents and 10,000 breaches worldwide. Learn the top trends, attack vectors, and actionable takeaways for defending against…
