MXDR for Google Cloud
Blog Post by Tracy Fox
Tracy FoxNovember 5, 2019< 1 min read
Why Do You Need Dark Web Monitoring?
Have you ever Googled your own name and been surprised by some of the information you ...
Start Reading
Tracy FoxOctober 30, 20192 min read
The Accidental Insider Threat – A clear and present risk
Media images depict the unknown ‘hooded’ bad actor in the dark room with many computer ...
Start Reading
Tracy FoxOctober 22, 20191 min read
Report on Ransomware Q4 2019
A look at the recently released cybercrime report by Malwarebytes that focuses on ...
Start Reading
Tracy FoxSeptember 30, 20192 min read
The Importance of Source Code for Web Application Penetration Testing
Overview
Start Reading
Tracy FoxSeptember 10, 20192 min read
Deception Technology – Fooling the Enemy
As the allies prepared for the D-Day invasion they employed deception to trick the enemy ...
Start Reading
Tracy FoxJuly 8, 20191 min read
New NIST Requirements Increase Cyber Security Controls
A new supplement to the National Institute of Standards and Technology (NIST) 800-171 ...
Start Reading
Tracy FoxJune 17, 20192 min read
What is proactive incident response?
Incident response as a term is reactive, so it’s no wonder that a proactive approach to ...
Start Reading
Tracy FoxJune 4, 20191 min read
Poorly Written Ransomware Still Infects Unpatched Systems
WannaCry malware hit the news in 2017 when reports of the damaging attack spread through ...
Start Reading
Tracy FoxMay 28, 20193 min read
Why you should frustrate your pen testers
The third or fourth step in any breach (depending on who you talk to) is that an attacker ...
Start Reading
Tracy FoxApril 29, 2019< 1 min read
What do our clients say about working with Foresite?
Sometimes it’s just best to let our clients do the talking – after all, no one ...
Start Reading