top of page
CYBERSECURITY AWARENESS
Justin Jackson
Aug 22, 2023
LET US BE YOUR SUNDAY: LEANING ON THE OFFENSE TO BUILD A RESILIENT CYBER DEFENSE
Taking a purely defensive perspective—one that abstains from getting the attacker's viewpoint—means your defenses will have holes in it.
34
Justin Jackson
Apr 7, 2023
A TRICKY GAP IN YOUR MFA STRATEGY
Traditionally, neither Microsoft nor Google disables the use of legacy protocols by default. The reason is legacy protocols are used by...
56
Justin Jackson
Mar 13, 2023
A CYBERSECURITY MANTRA: PREPARE FOR THE WORST, HOPE FOR THE BEST
The growing number of high-profile attacks combined with the countless ones no one has heard of is why we abide by the assumed breach model.
51
Justin Jackson
Feb 16, 2023
ELITE CYBER OPERATORS WHERE YOU NEED THEM THE MOST
Pathfynder is a veteran-owned small business with offices in Montana, North Carolina, and Washington, D.C.
20
Justin Jackson
Feb 13, 2023
THE ONE CYBERSECURITY QUESTION WE FEAR THE MOST
How do we suggest measuring your cybersecurity assessment performances? The best answer is some function of the adversarial level of effort.
75
Justin Jackson
Jun 27, 2022
THE MOST LIKELY WAY HACKERS WILL RUIN YOUR DAY
Here is an analysis of the most common ways an attacker will target your business using our experience at Pathfynder as a proxy.
75
Justin Jackson
Mar 31, 2022
WHY IS CYBERSECURITY SO HARD?
The Battle of Bastion sheds light on the difficulty of being on the defense. Cybersecurity by its nature is defensive which puts...
164
Kelly Sharadin
Sep 17, 2021
FIVE OPEN-SOURCE TOOLS FOR SOC ANALYSTS
Cybersecurity is an ever-evolving industry. But while the tools themselves will continue to change, the underlying investigative...
230
Justin Jackson
Jul 26, 2021
YES, HACKERS CAN STILL READ YOUR SIGNAL MESSAGES
While Signal is an outstanding encrypted communications tool, activating disappearing messages is necessary to prevent adversaries from...
61
bottom of page