Blogs about Cyber

Card image cap

Forbes Technology Council: Andrew Sellers on Remote Work

by QOMPLX | 3 days ago

Andrew Sellers, QOMPLX CTO and co-founder, was one of a panel of experts discussing how to secure remote workers against cyber threats for the Forbes Technology Council.

READ MORE

Card image cap

Emergent Threats To Your Healthcare Environment: Webinar

by QOMPLX | 4 days ago

A cyber attack on any organization is dangerous. A cyber attack on a critical healthcare environment can be a matter of life and death. Check out our recent webinar, featuring QOMPLX CISCO Andy Jaquith and Dale Nordenberg, M.D.: Authentication Attacks & Emergent Cyber Threats to Healthcare webinar.

READ MORE

Card image cap

QOMPLX Knowledge: 10 Active Directory Health Checks You Should Know

by QOMPLX | 11 days ago

Active Directory attacks and exploits of vulnerable identity infrastructure are part of more and more sophisticated intrusions. Here are 10 tips for locking down and monitoring your AD environment.

READ MORE

Card image cap

QOMPLX Knowledge: Fundamentals of Active Directory Trust Relationships

by QOMPLX | 16 days ago

Active Directory trust relationships allow users to access resources across AD forests and domains. Many of these relationships can be abused by attackers looking for lateral movement pathways on the network.

READ MORE

Card image cap

Jason Crabtree Interviewed by SafetyDetectives

by QOMPLX | 17 days ago

Jason Crabtree, QOMPLX CEO and co-founder, was interviewed by SafetyDetectives about the origins of QOMPLX.

READ MORE

Card image cap

QOMPLX Intelligence: Four Steps to Better OSINT Collection

by QOMPLX | a month ago

Open source intelligence plays a growing part in both cyber offense and defense. In this report, QOMPLX Senior OSINT Specialist Joe Gray describes four ways that individuals and organizations can sharpen their open source intelligence gathering.

READ MORE

Card image cap

Active Directory Attacks Ramp Up in Recent Incidents

by Michael Mimoso | a month ago

Active Directory attacks against NTT and supply chain providers in Europe and Asia included the use of Mimikatz to target Active Directory credentials.

READ MORE

Card image cap

New H-ISAC Framework tackles Authentication Risk in Healthcare

by Anna Rose Greenberg | a month ago

The healthcare ISAC (H-ISAC) is advising healthcare organizations to up their game including through the application of better analytic tools to spot authentication-based attacks.

READ MORE