The importance of a quick detection and response. Companies are constantly getting targeted by cyber-attacks, some of them may have important valuable customer information, production manufacturing secrets or, in general, sensitive data of all different kinds. Attacks are not always focused on stealing information, but can also aim at implanting ransomware, thus at stopping production […]

Over the last month, I have had the pleasure of delivering two new Truesec-developed courses! One focusing on Microsoft 365 Security and the other focusing on Microsoft Intune. This blog post will present these two new offerings and explain why they are more relevant than ever. I will also share my view on delivering online […]

You wake up at 17, ready to start your daily routine. You’re a criminal who works at night, robbing stores, kidnapping people, and reselling stolen jewelry. You do some research for what stores to rob, and off you go. Break into places, steal money, and sometimes you face the owner of the store you are […]

FBI issues a new cyber attack warning, writes Zak Doffman for Forbes Media, October 7, 2019. Until now Multi-Factor Authentication has been considered the top defense against similar cyberattacks. Even Microsoft states that they block 99% of enterprise account hacks. To learn more about this, we asked Truesecs identity guru Hasain Alshakarti to clerify a […]

I ett omfattande experiment satte säkerhetsexperter upp 500 falska IoT-enheter, även kallat “honeypots”. Efter bara två timmars exponering hade mer än 500 000 attacker mot IoT-enheter utförts. De falska enheterna var utformade att efterlikna och agera som riktiga routers, smart-TVs, webbkameror och andra vanliga så kallade “smarta enheter”. Experimentet fortsatte under fyra dagar och den […]