Justin Jackson6 days ago4 minTHE MOST LIKELY WAY HACKERS WILL RUIN YOUR DAYHere is an analysis of the most common ways an attacker will target your business using our experience at Pathfynder as a proxy.
Kelly SharadinSep 17, 20214 minFIVE OPEN-SOURCE TOOLS FOR SOC ANALYSTS Cybersecurity is an ever-evolving industry. But while the tools themselves will continue to change, the underlying investigative...
Justin JacksonJul 26, 20213 minYES, HACKERS CAN STILL READ YOUR SIGNAL MESSAGESWhile Signal is an outstanding encrypted communications tool, activating disappearing messages is necessary to prevent adversaries from...
Kelly SharadinJun 24, 20214 minBEEFING UP WEAK PASSWORDS: HOW TO USE A PASSWORD MANAGERPoor password management is responsible for the majority of cyber breaches and is still a very preventable vulnerability. Here is a guide...
Justin JacksonMay 18, 20213 minTOP THREE MOST COMMON SECURITY MISCONFIGURATIONS IN YOUR M365/GOOGLE WORKSPACE ENVIRONMENT Microsoft 0365 & Google Workspace audits are a great example of "low-hanging fruit" initiatives that produce enormous benefits to your org.
Justin JacksonSep 18, 20204 minTHE DAY I GOT PHISHED: AN EMBARRASSINGLY TRUE CONFESSION FROM SOMEONE THAT KNOWS BETTERA true confession from a well-trained executive on being duped by a highly targeted phishing campaign.
Justin JacksonSep 15, 20203 minMATURING A FORTUNE 50 INSIDER THREAT PROGRAMPathfynder’s insider threat solution distills highly manual processes into automated playbooks designed, tested, & implemented by experts.
Justin JacksonSep 9, 20204 minTHREE HARD TRUTHS FOR THE WORK-FROM-HOME CYBERSECURITY EXPERIENCEWhile the work from home advantage is clear for some businesses, leaders need to understand how this new reality impacts security postures.
Justin JacksonSep 4, 20201 minBOLO: ADVERSARY PURCHASING LOOK-ALIKE DOMAINS TARGETING INDUSTRIAL, SHIPPING, & LOGISTICS INDUSTRIESTo our peers in the industrial, shipping, & logistics industries, there is an adversary purchasing look-alike domains to execute attacks.
Justin JacksonSep 3, 20204 minGREEK TRAITORS & RUSSIAN HACKERS: A VIGNETTE ON INSIDER THREATSInsider threats are as old as history and remain a considerable cybersecurity concern. What are you doing to mitigate threats from within?