Podcast: What Are Cyber Security Red Teams and Why They Exist

Posted on by Mike Shinn

Cyber Security Red Teams have become a common tool for testing enterprise cyber security. They attempt to penetrate security defenses as if they were hackers. Red Teams are motivated to be creative and determine the best way to circumvent security measures in place, sometimes by any means possible. Mike has been red teaming since the […]

Podcast: Why Do Hackers Hack? It’s Not Why You Think

Posted on by Mike Shinn

Why do hackers want to break in? It’s a question that has been asked in lots of different ways. From why would they want to? Why would they care? And this is a really good question to ask yourself and to try and understand because often times people tend to look at what they’re protecting […]

Podcast: What Is File Integrity Monitoring (FIM)?

Posted on by Mike Shinn

File Integrity Monitoring is designed to notify you when files have changed on a system. It was one of the very first security detection capabilities in existence and is almost as old as passwords. FIM for PCI DSS Compliance and Other Security Protocols FIM has also been incorporated into many regulatory and security protocols. Mike […]