Our Blog

Check back for weekly updates

Using Selectors For Open Source Intelligence

Using Selectors For Open Source Intelligence

BlogUsing Selectors For Open Source Intelligence A “selector” is not a generally defined term in enterprise security, but selectors are important for understanding open source intelligence and investigations in the digital realm. Building on our previous technical...

read more
The Myth of Complex Passwords

The Myth of Complex Passwords

BlogThe Myth of Complex Passwords Password reuse is one of the most pervasive security concerns for information security teams in enterprise. It’s an easy way for an adversary to gain initial access if two factor authentication is not properly implemented and more...

read more

Stay up to the minute

Subscribe to our blog to get notified of updates in your inbox.