Secrutiny Cyber Security Blog
Get the latest in security advisories, threat commentary and remediation recommendations from information security experts.
Subscribe to our newsletter
Locking the Door Is No Longer Enough: Required Capabilities for Identity and Access Threat Prevention
In this blog, we will define the key requirements and capabilities of IATP solutions and the drivers they should support within an organisation.
Malicious actors continue to exploit Remote Desktop Protocol (RDP) to gain access to the target computers. Mitigate your exposure now.
Microsoft has officially dropped its 60-day password expiration policy from its security baseline, following May’s Window’s 10 updates.
Microsoft has released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services.
Gain a better understanding of the effectiveness of your cyber security controls in our cyber security validation infographic.
Attack simulations allow organisations to take a real-world approach to cyber risk and determine the effectiveness of its security architecture.