FIDO2 Vs MFA: Is it time to switch

FIDO2 is an open authentication standard that enables users to log in to online services without using a password. It uses public key cryptography to provide strong authentication that is resistant to phishing and other online attacks.  To use FIDO2, you will need a compatible device and an account with a service that supports FIDO2 […]

It’s not a Christmas Miracle

​ Cybersecurity threats are a growing concern, and the holiday season is no exception In fact, cybercriminals often take advantage of the increased online activity and relaxed security measures during this time to launch their attacks. You might remember some of events such as “Leaksmas” when in the days leading up to Christmas, cybercriminals leaked […]

AI, BlockChain, LLMs and Information Security

Artificial Intelligence (AI) and Blockchain are two of the most transformative technologies of our time, each with the potential to revolutionize industries and reshape society. When combined with the power of Large Language Models (LLMs), they create a potent synergy that is both exciting and concerning. Some of most notable solutions and frameworks are: TensorFlow, […]

CIS Critical Security Controls Navigator

The CIS Critical Security Controls Navigator is a free interactive tool that provides detailed mapping information for both CIS Controls version 7.1 and version 8. This tool makes it easy for organizations to explore how the CIS Controls align with various standards and frameworks. How to use it: Features and Benefits: Additional Resources: Conclusion: The […]

Risks of Misconfigured SPF Records and Examples

Sender Policy Framework (SPF) is a critical email authentication protocol that helps prevent email spoofing. However, misconfigurations in SPF records can lead to several issues, impacting email deliverability and security. The ~all Qualifier The ~all qualifier in an SPF record is a critical element that determines how receiving mail servers should handle emails that don’t […]

The MITRE ATT&CK Framework: A Blueprint for Cybersecurity

The MITRE ATT&CK framework has become an indispensable tool for both defenders and attackers in the cybersecurity landscape. This comprehensive knowledge base, developed by the MITRE Corporation, provides a standardized taxonomy of adversary tactics, techniques, and procedures (TTPs). By understanding how attackers operate, organizations can enhance their security posture and proactively defend against threats. Why […]