Cybersecurity Resources
Latest Cybersecurity Resources
In this series the service delivery team writes about an outstanding talk they saw at a conference and implementing those lessons at scale.
A “red team” is a group of security experts within an organization, which aims to breach security measures and uncover vulnerabilities, to help the organization improve its defenses.
Vulnerability management is the ongoing process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and software
Security risk analysis evaluates potential threats and vulnerabilities affecting an organization’s critical information security resources.
Penetration testing is a simulated cyber-attack against a computer system, network, or application to evaluate its security posture.
A company's attack surface naturally grows with the company, but there are still ways to reduce possible entry points for attackers. Learn 6 ways to reduce your attack surface below.