By: Alex Shanteau, Security Engineer, MAD Security | June 27, 2019 When assessing growth strategies, it’s important to consider the security implications brought forth by them as they relate to your current security posture and business goals. In this blog, we will...
By: Alex Shanteau, Security Engineer, MAD Security | March 28, 2019 A never-ending war is being waged between malicious actors and cybersecurity specialists. In order to stand their ground, defenders must constantly develop new and innovative ways to protect their...
By: Jeremy Klinzak, Security Engineer, MAD Security | February 7, 2019 Mobile device security is an important part of securing IT assets for companies today. These devices are some of the most exposed parts of IT infrastructure, as they go everywhere the employee...
By: Scott Busby, Security Engineer, MAD Security | February 1, 2019 The name ransomware comes from a not particularly clever combination of the words “ransom” and “malware”. First seen in 2013, ransomware is a type of evolving malware that attempts to encrypt files...
By: Will Young, Director of Technical Testing, MAD Security | January 10, 2019 Protecting users from phishing attacks requires utilizing a defense in depth strategy. Users are the last line of defense against phishing attacks and are also unfortunately, the weakest. ...
By: Alex Shanteau, Senior Security Consultant, MAD Security | January 3, 2019 As the untamed cyber threat landscape evolves in scope, sophistication, and reach, the risks organizations face will continue to increase not only in number, but in severity, and they are...