ShadowscapeNov 12The CMMC Final Rule is Here - Where do I start?Now that the CMMC Final Rule has been published, you might be thinking, "now that the CMMC rule is final, it's time to focus on...
Aeden MurrayOct 31, 2023Conducting OSINT via DNSIntroduction In the digital world, conducting an open-source intelligence (OSINT) assessment against your organization is an important...
ShadowscapeDec 13, 2021Log4j Java vulnerability is devastating, so what can you do to protect yourself?One of the most popular logging libraries in Java, Log4j, was recently discovered to have serious cybersecurity vulnerabilities. While...