Security

ransomware targeted attacks privilege interaction

Exposing Targeted Attacks by Observing Privilege Interactions Between Entities

In May 2019, most of Baltimore’s government computer systems were infected with a new and aggressive ransomware variant named RobbinHood. All servers, with the exception of essential services, were taken offline as a result of targeted attacks. In a ransom

Exposing Targeted Attacks by Observing Privilege Interactions Between Entities Read More »

Qualys IOC EDR Indication of Compromise

Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility

Qualys is a sponsor of TechSpective Technology and cybersecurity are constantly changing and evolving—as are the tools, techniques and processes used by cyber attackers. Just because something may have been relatively effective once upon a time doesn’t necessarily mean it

Effective Cybersecurity Requires Threat Intelligence and Comprehensive Visibility Read More »

intranet cloud security authentication passwords

A No-Compromise Approach to Your Cloud-Based Intranet Security

It’s a well-established fact that companies prefer cloud solutions to on-premises ones when it comes to practically any software. It’s estimated that over 80% of all enterprise workloads will be in the cloud by 2020. But what about an intranet?

A No-Compromise Approach to Your Cloud-Based Intranet Security Read More »

Scroll to Top