Cyber Security Awareness and Vulnerabilities Blog

anti-virus-compare-banner-900x400.jpg

Antivirus solutions are like a water filter for your IT environment – they catch impurities that can poison your system. This is what makes detection rates such an important consideration when Linux IT security professionals are choosing an antivirus solution. These ratings analyze…

Read More

cryptojacking-banner-1920x744.jpg

It’s hard to escape hearing about cryptocurrency these days. But this new monetary system is not utilized by a large percent of the population, and is incredibly complex, so many of us are left to simply smile and nod when it’s brought up…

Read More

As an exploit writer, one of my tasks consists of gathering common vulnerabilities and exposures (CVE) and all of the information related to them in order to design an exploit for Core Impact. As part of this process I stumbled across CVE-2018-15422: A…

Read More

ptx-cloud-security-blog-1920x744_0.jpg

Though the common vernacular is “The Cloud,” the truth is, there are multiple cloud environments and providers available to organizations looking to utilize this growing technology. Read on to learn about the different types of cloud environments, and the biggest security obstacle each presents. Cloud…

Read More

antivirus-banner-1920x744.jpg

The threat landscape can be a frightening scene when you look at the malicious attacks and ransomware infiltrating organizations around the globe. The good news: Endpoint antivirus applications are making enormous strides in their ability to protect enterprise-level equipment and data from attack.…

Read More

090418-ptx-a-full-body-scan-endpoint-antivirus-main-image_0.jpg

With cyberattacks still on the rise, you can never be too careful when it comes to securing your company’s data and the systems that house it. The problem is, without advanced endpoint protection it can be hard to discover the malware, viruses, and…

Read More

hero-image.jpg

As a syslog server incessantly pings with every security notification, security teams can feel as though they are drowning in a sea of security warnings. Without a SIEM, it’s difficult to know which events are truly critical and which can be ignored. However,…

Read More

ptx-open-source-v-commercial-blog-1920x744.jpg

Open source SIEM solutions provide basic functionality that can be great for smaller organizations that are just beginning to log and analyze their security event data. But over time, many IT pros find that open source SIEM software is too labor-intensive to be…

Read More

These days it seems like there are security solutions for almost everything except the one thing you can never fully secure: humans. But while you can’t control everything they open or click on, you can control their access to your sensitive data. However, with increasing numbers…

Read More

Identity Governance and Administration (IGA) is a complex and growing, set of solutions that are put in place to help your organization stay compliant with government or industry regulations and, perhaps more importantly, help secure your organization. However, with every new solution, there are…

Read More