Skip to the main content.
Contact
Contact

Blog

Be in touch with our latest news

cyber attack seasons

3 min read

Cyber Attack Seasons: Key Times When Businesses Are at Risk

While cyber attacks remain a persistent, year-round threat to organizations, cybersecurity professionals have discovered patterns in the frequency...

Read More >

3 min read

Safeguarding Innovation in the Digital Age

In today's fast-paced tech landscape, startups are the driving force behind innovation. However, with rapid growth and development comes increased...

Read More >
cloud application security

3 min read

Enhancing Cloud Application Security: OWASP 2024 Guide for Developers

The Open Worldwide Application Security Project (OWASP) is an essential resource for developers, particularly those working with cloud-based systems....

Read More >

18 min read

Understanding the Risks Associated with NTLM Authentication

Despite the release of Kerberos more than 20 years ago, many enterprises today have not transitioned away from using NTLM authentication in their...

Read More >

PCI Compliance V4.0: Is your Business Ready?

Control Gap's Robert Spivak had a follow up session with David Goodale from www.merchant-accounts.ca to talk about some of the major impacts that PCI...

Read More >

7 min read

Access Control Facades and Hardcoded Secrets: A Sage 300 Case Study (Part 3)

This is a continuation of the Sage 300 case study series where we explore the process of discovering and developing exploits for six (6) different...

Read More >

28 min read

Access Control Facades and Hardcoded Secrets: A Sage 300 Case Study (Part 2)

This is a continuation of the Sage 300 case study series where we explore the process of discovering and developing exploits for six (6) different...

Read More >

19 min read

Access Control Facades and Hardcoded Secrets: A Sage 300 Case Study (Part 1)

Software solutions have had to evolve rapidly to keep pace with cybersecurity threats. Today, nearly every significant software solution is loaded...

Read More >

3 min read

Enhancing Vulnerability Assessment and Risk Scoring with CVSS 4.0

In the realm of cybersecurity, accurately assessing and quantifying the severity of vulnerabilities is crucial for organizations to effectively...

Read More >