Tech Talk

News you can use

How to Handle Security Misconfigurations

No matter how big or small your company is, security misconfigurations will always be a topic of discussion. Security misconfigurations,...
Read More about How to Handle Security Misconfigurations

Explaining Web Application Attacks

Healthcare web applications provide access for patients to make appointments and obtain copies of test results and medical records, but...
Read More about Explaining Web Application Attacks

What is Patch Management?

Patch management is the practice of keeping software up to date through software updates. The updates, called patches, are necessary...
Read More about What is Patch Management?

Let’s Get Back to the Basics

Nowadays, there is an abundance of services revolving around cybersecurity. There are gaps and problems and tools are built to...
Read More about Let’s Get Back to the Basics

What are the motivations for cyber-attacks?

Cyber-attacks can leave companies wondering “how could this happen to us?” so, when these situations arise, it can help to...
Read More about What are the motivations for cyber-attacks?

Vulnerability Assessment vs Penetration Testing

Cybersecurity isn’t a one-time, set-it-and-forget-it process. Instead, organizations that want to proactively eliminate cyber threats need diligent assessment and testing...
Read More about Vulnerability Assessment vs Penetration Testing

The Evolving Cyber Insurance Market

The cost of cyber insurance is on the rise with premiums jumping 50-100% in some cases. While inflation is all...
Read More about The Evolving Cyber Insurance Market

The Motivation of Cyber Threat Actors: Who’s after your stuff?

One way to approach the daunting task of how to protect cyber assets is to look at it from the...
Read More about The Motivation of Cyber Threat Actors: Who’s after your stuff?

Top-Off Ceremony at Stratix Systems

Monday, May 9, was a day of celebration here at Stratix Systems. That day, Stratix Systems and general contractor D&B...
Read More about Top-Off Ceremony at Stratix Systems

Social Media Phishing

Social media has blossomed throughout the world over the last decade. What was once a small community has now become...
Read More about Social Media Phishing

Seven Tenets of Zero Trust Architecture

In 2020, NIST released special publication 800-207 called Zero Trust Architecture or ZTA. It mentioned specifically seven tenets stating, “A...
Read More about Seven Tenets of Zero Trust Architecture

Best Practices for Web Application Testing

Data breaches or disclosure of information records have become a regular part of business news. According to the Identity Theft...
Read More about Best Practices for Web Application Testing
Scroll to Top