by | Jan 22, 2024 | Semperis
When it comes to cybersecurity—especially the security of critical identity infrastructure—the minimum expectation for every organization should be closing known vulnerabilities and configuration gaps. Welcome to the second of our three-part discussion of how the CISA...
by | Jan 17, 2024 | Aquant
In a recent episode of the “AI in Business” podcast, Shahar Chen, CEO and co-founder of Aquant, joined Matthew DeMello, senior editor at Emerge Technology Research, to share his perspectives on the rapidly transforming landscape of AI in manufacturing and its broader...
by | Jan 16, 2024 | Semperis
Any organization that relies on Kerberos authentication—the primary authentication method in Active Directory environments—is potentially vulnerable to a Pass the Ticket attack. Organizations that do not regularly patch their systems, monitor and secure Active...
by | Jan 16, 2024 | Semperis
Late last year, the United States National Security Agency’s (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) released a list of the most common vulnerabilities in large computer networks. This list of CISA and NSA top ten cybersecurity...
by | Jan 9, 2024 | Semperis
Each year, the total number of cyberattacks and cost of ransomware-related damage increases globally. Microsoft recently reported that attempted password attacks have soared “from around 3 billion per month to over 30 billion.” Clearly, a proactive approach to...