Resources

Blog

Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051)

In this blog post, I will explain a vulnerability in the Microsoft Windows Desktop Windows Manager (DWM) Core library that I analyzed when the exploit for Core Impact was being developed. This vulnerability allows an unprivileged attacker to execute code as a DWM user with Integrity System privileges (CVE-2024-30051).Since there was not enough public information at the time to develop the exploit,...
Blog

How Does the DMZ Impact Security?

The DMZ can be a good tool to add to your arsenal, but are you aware how it can impact your security negatively?
Blog

Six Strategies to Ensure You Give the Right Access to the Right People at the Right Time

Part 2 of the Improving Your Security-Efficiency Balance Series: One of the primary challenges organizations wrestle with in identity governance is how to achieve the right balance in their company between security and efficiency. In Part 1 of the Improving Your Security-Efficiency Balance Series, we examined the unique balancing act organizations face when it comes to user access. In this blog...
Blog

The Evolution of Cybersecurity Solutions for Organizations

In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
Blog

How Encryption Works: Everything You Need to Know

Encrypting files helps defend against cybersecurity threats. Learn more about how it works and what method, combined with GoAnywhere MFT, is recommended depending on your specific needs.
Blog

What Is SIEM?

SIEM (security information and event management) software provides insights into potential security threats through data normalization and threat prioritization, giving IT professionals an effective method of automating processes and centralizing security management in a way that helps them simplify the difficult task of protecting sensitive data.