Tom Brennan

catscan-test-scenerios

4 min read

Blog Archives

In the world of cybersecurity, there are three core pillars that every organization should be focusing on: people, process, and technology. These three work in tandem to ensure that your organization isn’t the next target of a data breach,...

Read More

Join the retired investigator guild and shared purpose partners @ Old Homestead Steakhouse, NYC 1/24

There are countless unsolved murders, lives devastated by human trafficking, and cybercriminals operating in the shadows. We’re calling on our...

Read More

2 min read

Blog Archives

In an age where digital landscapes dominate, the value of human interaction and in-person learning experiences remains unparalleled, especially for...

Read More

2 min read

its a people problem

In today's digital landscape, cybersecurity is of paramount importance for organizations across all industries. Despite extensive investments in...

Read More

2 min read

CRI 2.0 (Cyber Risk Index 2.0) is more than just a framework — it’s a competitive advantage.

In today’s digital-first financial world, cybersecurity is no longer just an IT issue — it’s a critical business priority. With rising ransomware...

Read More

1 min read

Blog Archives

CREST is short for Council of Registered Ethical Security Testers The Council of Registered Ethical Security Testers (CREST) is a not-for profit...

Read More

1 min read

Blog Archives

Here are some best practices for a small business that has purchased Microsoft Windows Server 2019: Plan your deployment: Before deploying Windows...

Read More

2 min read

Blog Archives

Published in Information Security Buzz Scrutiny over data protection and privacy, and the reporting and analysis behind a powerful threat defense, is...

Read More

12 min read

One Hundred sixty nine questions about your security program - By Tom brennan

Commerically Reasonable Cyber Security in 169 Questions - By Tom Brennan Mature organizations want to manage to "best practice" so that they can be...

Read More

7 min read

Scan Exchange log files for indicators of compromise

If your organization runs an OWA server exposed to the internet, assume compromise between 02/26-03/03. Check for 8 character aspx files in...

Read More