Cyber Security Blog

Why Your Organization Needs Security Policies
February 2022
A well written security policy lets employees know what is and isn't allowed within your organization. Without clearly defined policies...
What Is Security Information And Event Management (SIEM)?
December 2021
SIEM is a powerful tool to analyze large volumes of logs for security events and for generating automated alerts. Without a SIEM...
Maintenance, Monitoring and Analysis of Audit Logs - Top 20 Security Controls
October 2021
Logs contain the footsteps of hidden enemies working to compromise your environment. In this sixth article in our series on the top security controls...
Secure Configurations - Top 20 Security Controls
August 2021
It only takes one misconfigured host for an attacker to gain access to your environment. Implementing a strategy for securely configuring the hosts in your environment is critical to protecting your organization. In this fifth article in our series on the top security controls...
Controlled Use of Admin Privileges - Top 20 Security Controls
June 2021
Admin privileges are the keys to your kingdom, insufficient protection increases the likelihood of a hacker using them against you. In this fourth article in our series on the top security controls...
Vulnerability Management - Top 20 Security Controls
April 2021
Managing the vulnerabilities that exist in your environment is a crucial step in securing your organization. In this third article in our series on the top security controls...
Inventory and Management of Software Assets - Top 20 Security Controls
February 2021
Maintaining an up-to-date inventory of software assets is a crucial step in securing your organization. In this second article in our series on the top security controls...
Inventory and Management of Hardware Assets - Top 20 Security Controls
December 2020
Maintaining an up-to-date inventory of hardware assets is a crucial first step in securing your organization. In this first article in our series on the top security controls...
What Makes a Good Password?
October 2020
What characteristics do you need in your passwords to make it difficult for criminals to defeat?
Bad Passwords Are Like No Passwords
August 2020
Why would criminals bother exploiting your hosts if they can walk right in with a poor password?
The Hacker Methodology - How Is It Done?
June 2020
Most successful breaches are executed by adversaries following a similar methodology. Understanding that methodology is key to a successful defense.
Security Awareness Training - Why You Need It
April 2020
A staggering 90% of successful network breaches are caused by user error. Have you done enough to mitigate this risk at your organization?
Preventive Security Is Not Enough
February 2020
Preventive security solutions like, anti-virus and firewalls are not enough. Without detection, you won't know how or when your security controls are failing...
What is Phishing?
December 2019
Phishing is widely considered the largest threat to companies in 2019. What is it? And how can we mitigate the risk...
Securing Your Company From Hackers - Where to Start?
October 2019
Cut through the endless amount of information and snake oil and read how you can prioritize where to start securing your organization from...
Lessons From Major Security Breaches
August 2019
Carefully analyzing major security breaches provides insight on where things commonly go wrong. These three factors are always present...
Hacking Explained: Advanced Phishing Attacks and Defense
June 2019
A new phishing tool was released which allows hackers to monitor victims as they shop or send emails. Here's how it works, and how you can protect users who visit your...
Protect Your Organization With A Security Risk Assessment
April 2019
A security risk assessment is a crucial step for mitigating the cyber security risks in your organization. Without identifying and addressing the risks in your environment, you have no chance to prevent a catastrophic...
Hacking Explained: URL Spoofing Trick
February 2019
This simple but effective URL spoofing trick can fool even the most security conscious users into believing they are on a legitimate website...
Hacking Explained: DNS Spoofing
December 2018
What is DNS and DNS Spoofing? Security Engineer and Co-Founder Michael Wetherald gives a basic explanation of DNS and how it can be spoofed in order to...
Hacking Explained: ARP Spoofing
October 2018
What is ARP and ARP Spoofing? Security Engineer and Co-Founder Michael Wetherald gives a basic explanation of ARP and how it can be spoofed in order to...

© 2023 Viam Technologies