Mindblown: a blog about philosophy.

  • Vulnerability Research and Exploitation

    Vulnerability Research and Exploitation

    Vulnerability research and exploitation are critical aspects of cybersecurity. Vulnerability research refers to the process of discovering weaknesses or vulnerabilities in computer systems, networks, or software applications. Exploitation is the act of taking advantage of these vulnerabilities to gain unauthorised access or control over the system. As computer systems and networks become more complex and

  • Malware Analysis and Detection Techniques

    Malware Analysis and Detection Techniques

    Malware analysis and detection techniques are essential components of modern cybersecurity. Malware refers to any type of malicious software that can harm computer systems, steal data, or disrupt network operations. As the number of malware attacks increases, malware analysis and detection techniques are becoming increasingly sophisticated to identify and prevent these threats. There are several

  • Why Mobile App Security Testing is Critical for Your Business

    Why Mobile App Security Testing is Critical for Your Business

    As mobile apps become more prevalent in our daily lives, it’s important to remember that they are not immune to security risks. In fact, mobile apps are often targeted by cyber criminals as an easy entry point into your network. That’s why mobile app security testing is critical to ensure that your business remains protected.

  • How CIS Benchmarks Can Improve Your Office 365 Cybersecurity

    How CIS Benchmarks Can Improve Your Office 365 Cybersecurity

    As more and more businesses move to cloud-based solutions, it’s important to ensure that proper security measures are in place to protect against cyber threats. One tool that can help with this is the CIS Benchmarks for Office 365. The Center for Internet Security (CIS) is a non-profit organization that focuses on cybersecurity readiness and

  • Why Internal Penetration Testing is Superior to Vulnerability Scanning

    Why Internal Penetration Testing is Superior to Vulnerability Scanning

    In today’s digital world, cyber-attacks have become increasingly prevalent and sophisticated, posing a significant threat to businesses of all sizes. Cybercriminals are always on the lookout for vulnerabilities they can exploit, making it crucial for businesses to take a proactive approach to cyber security. One of the most effective ways to do so is through

  • Cyber Essentials Plus: Protect Your Business Against Cyber Threats

    Cyber Essentials Plus: Protect Your Business Against Cyber Threats

    Cybersecurity is a critical issue for any business in the digital age. With more and more companies moving their operations online, it’s becoming increasingly important to protect your organization from cyber threats. Cyber Essentials Plus is a certification scheme that can help you do just that. What is Cyber Essentials Plus? Cyber Essentials Plus is

  • Bigger Is Not Always Better: How Closed Door Security Outperforms the Competition

    Bigger Is Not Always Better: How Closed Door Security Outperforms the Competition

    As the world becomes more digitally connected, cyber security has become an increasingly important concern for businesses of all sizes. When it comes to protecting sensitive data and systems from cyber threats, there are many options to choose from. However, not all cyber security businesses are created equal. Here are a few reasons why Closed

  • Cybersecurity for Small Businesses: Protecting Your Business and Your Customers

    Cybersecurity for Small Businesses: Protecting Your Business and Your Customers

    In today’s digital age, cybersecurity is more important than ever, especially for small businesses. Small businesses are just as vulnerable to cyber threats as large corporations, but often lack the resources and expertise to adequately protect themselves. Here are some key steps that small businesses can take to protect themselves and their customers from cyber

  • Understanding Malware: What it is, How it Works, and How to Protect Yourself

    Understanding Malware: What it is, How it Works, and How to Protect Yourself

    In today’s digital age, malware is a persistent threat that continues to affect millions of people worldwide. Malware is a term used to describe a wide range of malicious software programs that are designed to infiltrate, damage or disable computer systems, networks, and devices. It’s important to understand how malware works, the types of malware

  • Closed Door Security: Our Experience with an MSP’s Internal Network Security

    Closed Door Security: Our Experience with an MSP’s Internal Network Security

    Malware Attack: Importance of Internal Network Security At Closed Door Security, we were previously hired by an MSP to conduct an internal assessment of their network. The audit was carried out from an assumed breach standpoint where a malicious device was attached to the internal network by an ’employee’. Our testing led to the discovery

Got any book recommendations?