top of page

CYBERSECURITY AWARENESS


LET US BE YOUR SUNDAY: LEANING ON THE OFFENSE TO BUILD A RESILIENT CYBER DEFENSE
Taking a purely defensive perspective—one that abstains from getting the attacker's viewpoint—means your defenses will have holes in it.
Justin Jackson
Aug 22, 2023
34


A TRICKY GAP IN YOUR MFA STRATEGY
Traditionally, neither Microsoft nor Google disables the use of legacy protocols by default. The reason is legacy protocols are used by...
Justin Jackson
Apr 7, 2023
56


A CYBERSECURITY MANTRA: PREPARE FOR THE WORST, HOPE FOR THE BEST
The growing number of high-profile attacks combined with the countless ones no one has heard of is why we abide by the assumed breach model.
Justin Jackson
Mar 13, 2023
51


ELITE CYBER OPERATORS WHERE YOU NEED THEM THE MOST
Pathfynder is a veteran-owned small business with offices in Montana, North Carolina, and Washington, D.C.
Justin Jackson
Feb 16, 2023
20


THE ONE CYBERSECURITY QUESTION WE FEAR THE MOST
How do we suggest measuring your cybersecurity assessment performances? The best answer is some function of the adversarial level of effort.
Justin Jackson
Feb 13, 2023
75


THE MOST LIKELY WAY HACKERS WILL RUIN YOUR DAY
Here is an analysis of the most common ways an attacker will target your business using our experience at Pathfynder as a proxy.
Justin Jackson
Jun 27, 2022
76


WHY IS CYBERSECURITY SO HARD?
The Battle of Bastion sheds light on the difficulty of being on the defense. Cybersecurity by its nature is defensive which puts...
Justin Jackson
Mar 31, 2022
164


FIVE OPEN-SOURCE TOOLS FOR SOC ANALYSTS
Cybersecurity is an ever-evolving industry. But while the tools themselves will continue to change, the underlying investigative...
Kelly Sharadin
Sep 17, 2021
249


YES, HACKERS CAN STILL READ YOUR SIGNAL MESSAGES
While Signal is an outstanding encrypted communications tool, activating disappearing messages is necessary to prevent adversaries from...
Justin Jackson
Jul 26, 2021
66


BEEFING UP WEAK PASSWORDS: HOW TO USE A PASSWORD MANAGER
Poor password management is responsible for the majority of cyber breaches and is still a very preventable vulnerability. Here is a guide...
Kelly Sharadin
Jun 24, 2021
23


TOP THREE MOST COMMON SECURITY MISCONFIGURATIONS IN YOUR M365/GOOGLE WORKSPACE ENVIRONMENT
Microsoft 0365 & Google Workspace audits are a great example of "low-hanging fruit" initiatives that produce enormous benefits to your org.
Justin Jackson
May 18, 2021
67


GOING PURPLE: BUILD A BETTER DEFENSE THROUGH CONSTRUCTIVE COLLABORATION
Purple Team engagements - with their focus on collaboration & shared outcomes - are great options to build skills of blue team defenders.
Justin Jackson
Dec 17, 2020
37


​THE DAY I GOT PHISHED: AN EMBARRASSINGLY TRUE CONFESSION FROM SOMEONE THAT KNOWS BETTER
A true confession from a well-trained executive on being duped by a highly targeted phishing campaign.
Justin Jackson
Sep 18, 2020
40


MATURING A FORTUNE 50 INSIDER THREAT PROGRAM
Pathfynder’s insider threat solution distills highly manual processes into automated playbooks designed, tested, & implemented by experts.
Justin Jackson
Sep 15, 2020
15


THREE HARD TRUTHS FOR THE WORK-FROM-HOME CYBERSECURITY EXPERIENCE
While the work from home advantage is clear for some businesses, leaders need to understand how this new reality impacts security postures.
Justin Jackson
Sep 9, 2020
17
bottom of page