Threat of the Month

November 9, 2020

SECURITY

RDP and the remote desktop

6 min read

Does your organization use RDP? In our latest Threat of the Month blog, we examine how bad actors leverage the protocol and what can be done to protect against attacks.

May 28, 2020

SECURITY

Remote work and the threat landscape

4 min read

This month, we decided to take a look at some of the trends we’ve seen in a shifting threat landscape, including attackers who are adapting their techniques to take advantage of new opportunities. When you understand what they’re doing, it’s easier to mount a better defense against new trends in the threat landscape. 

April 27, 2020

SECURITY

Securing the remote work environment

6 min read

As organizations adopt remote working, how should they evaluate their security posture? And what are the top threats they may face?

March 31, 2020

SECURITY

Stealing passwords with credential dumping

6 min read

What is “credential dumping” and why should security professionals be paying attention? Find out more in this Threat of the Month.

February 25, 2020

SECURITY

Explorations in the spam folder

7 min read

Everyone has a spam folder. It’s often disregarded as a dark, bottomless pit for fake emails from FedEx, pharmacy offers, and introductory emails from women far too amorous to be anything but fantastical. You’d be right to largely ignore this folder. Yet each day new emails end up in it. Most of us have learned […]

January 29, 2020

SECURITY

Securing Industrial IoT

6 min read

It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a part in your daily life. From the […]

November 25, 2019

SECURITY

Malvertising

6 min read

Online advertising is an integral part of today’s internet experience. In many ways, ads are the lifeblood behind many websites, providing the necessary funding to keep sites running, as well as supporting the creation of new content. While it may appear as though the ads that are displayed are just a component of the site […]

October 30, 2019

SECURITY

Remote Access Trojans

6 min read

You’re working for a high-profile technology company, close to releasing a market-changing product to the public. It’s a highly contested space, with many competitors, both domestic and international. There’s also...

September 30, 2019

SECURITY

Threats in encrypted traffic

5 min read

There was a time when the web was open. Quite literally—communications taking place on the early web were not masked in any significant fashion. This meant that it was...