Bug Bounty Programs are Becoming Increasingly Effective
What is the Difference Between Bug Bounty and Vulnerability Management Programs? In this blog, SecureOps Senior Penetration Tester Jasmin Landry has provided us deep insight into bug bounty programs in two
Why MAZE Ransomware Attacks are So Devastating
Why MAZE Ransomware Attacks are So Devastating MAZE ransomware is quickly becoming one of the most devastating strains of Windows ransomware that have infiltrated companies and organizations around the world and
4 Key Steps to Stopping Ransomware Attacks
How Significant is the Ransomware Problem? In writing this blog post we reviewed data from a variety of surveys including the Verizon Data Breach Report, the Cybersecurity Insiders Survey, the Ponemon
Securing Your Remote Workforce
Protecting Your Remote Employees from Cyber Attacks As we suggested in our last blog post, this blog post was written to help our customers and readers of our blog protect themselves
Patch Management Best Practices
Vulnerabilities and Poor Patching Practices Lead to Breaches In our previous blog posts, which discussed the differences between Vulnerability Scans, Vulnerability Assessments, Vulnerability Management and Penetration Tests we indicated how vital
The Difference Between a Penetration Test and Vulnerability Assessment (2 of 2)
What is the Difference Between a Penetration Test and Vulnerability Assessment? Part 2 of 2 Comparing Penetration Tests and Vulnerability Assessments In part 1 of this post, we focused on the Vulnerability Scans,