by Gillian Sweny | Sep 24, 2021 | Blog Posts
Microsoft Exchange’s Autodiscover protocol leaked approximately 100,000 login names and passwords for Windows domains worldwide as a result to an unpatched design flaw in the implementation. The Exchange Audiodiscover service enables users to configure...
by Gillian Sweny | Sep 7, 2021 | Blog Posts
Machine learning (ML) and artificial intelligence (AI) are two trending technologies that are used to develop highly intelligent software systems. Commonly, individuals mistake AI and ML to be the same thing; Although these two technologies are related, they are not...
by Gillian Sweny | Sep 1, 2021 | Blog Posts
Cyber criminals have taken their hacking skills up a notch in 2021; forcing software developers to create SaaS solutions that are equally as complex. After another month of this brutal attack chain, c-suite executives are left wondering whether they will be able to...
by Gillian Sweny | Aug 31, 2021 | Blog Posts
Insider threats exist in every organization regardless of how much trust you have in your employees. While at times cybersecurity risks can stem from employee mistakes, there can also be opportunistic employees that don’t have your organization’s best interest in...
by Gillian Sweny | Aug 10, 2021 | Blog Posts
Cyberattacks, as well as the malicious actors behind them, have become more sophisticated and harder to prevent. To best protect your company, it is important to know which Software-as-a-Service (SaaS) solution will keep intruders out. For businesses to practice data...
by Gillian Sweny | Aug 2, 2021 | Blog Posts
The Biden administration has placed a strong focus on cybersecurity this year, releasing multiple updates about how they plan to strengthen cybersecurity infrastructure. So far, 2021 has exposed many cybersecurity vulnerabilities in the U.S with the Colonial Pipeline...