Why You Need an Offensive Security Solution

Cybersecurity professionals are always looking to keep up with new and changing threats, as well as developing new tactics and technologies to guard against cyberattacks. Traditional approaches to security are focused on defensive or reactive measures, generally blocking attacks from…

Weekly Update 329

Presently sponsored by: 1Password, a secure password manager, is building the passwordless experience you deserve. See how passkeys work Strap yourself in, this is a big one! Big video, big breach (scrape?), and a big audience today. The Twitter incident…

Digital forensics incident readiness

Digital forensics is used to find, examine and analyze digital evidence that can serve in criminal investigations, but also in incident response, investigations of data breaches, to unearth insider threats, etc. Colm Gallagher, Forensics Director, CommSec Communications & Security, talks…

Redspin, a Division of Clearwater, Announces Its Client Aero-Glen International Has Passed the First Voluntary Assessment Related to the CMMC Initiative

AUSTIN, Texas–(BUSINESS WIRE)–Redspin, a Division Clearwater and the first organization authorized as a Cybersecurity Maturity Model Certification (CMMC) Third-Party Assessment Organization (C3PAO), announced today that its client, Aero-Glen International, LLC, passed its Joint Surveillance Voluntary Assessment Program (JSVAP) assessment. The…

2023 Cybersecurity predictions

Cybersecurity is a relatively new discipline in the realm of computing. Once computing became more democratized with PCs connected via local area networks (LAN) and client/server environments, adversaries quickly saw opportunities. The more democratized computing – the more risk and…