Cindy Kaplan2025-09-08T17:11:25+00:00
Prioritized Findings and Remediation in Cloud Security Reporting
How Do You manage Your Cloud Security Profile and Risk Mitigation Plan?
As cloud (more…)
The Dangers of Legacy Protocols
How poisoning legacy broadcast name resolution protocols led to domain compromise
In a recent (more…)
Daylight Savings Time DST
Time to Spring Ahead!
Daylight Saving Time (DST) is just around the corner! Yes, (more…)
A Threat Based Approach to Penetration Test Reporting
The threat of cyberattacks is ever-present, making it crucial for organizations to continuously (more…)
Managing AI Risks in Organizational Adoption and Usage
The Heist
It started with an email. (more…)
Compromised Credential Leads to Major Educational Data Leak Powerschool
Description
K-12 schools manage vast amounts of sensitive personal information about students and educators. (more…)
What Legislation Protects Against Deepfakes and Synthetic Media?
A Deep Look at Deepfake Regulation (more…)
Why Every Organization Needs an Effective Incident Response Plan (IRP)
The Strategic Edge: Why Every Organization Needs an Effective Incident Response Plan (IRP)
There (more…)
Understanding Access Control: Authentication vs. Authorization
This post will explore two essential components of Access Control for web applications (more…)
