Red Sentry Article Hub.

Thought provoking write-ups for the sec ops industry.

MSPs must think like dentists in order to provide the highest level of cybersecurity for their clients. They must first learn their clients from the inside out by administering vulnerability scanning and even penetration testing to best prevent future exploits.
Log4Shell is inescapable, and companies must protect themselves from future vulnerabilities. The key is to use a combination of offensive and defensive tools.
Clouds in the sky
Cloud providers handle the technical end of security quite well. But cloud environments can still be exploited. Most of the time, it’s end users that are the problem.
Smart phone with apps
SIM swap scams are everywhere, and it is all too easy to become a victim of them. Although SIM swapping sounds technical, it is actually a form of social engineering, which means hacking humans instead of hacking technology.
Screen shot of Red Sentry detecting a subdomain takeover
It’s surprisingly easy for a malicious hacker to do a subdomain takeover. Here’s how to protect yourself from this type of attack.
Monster behind door
Getting hacked is far scarier than any Halloween costume!
Feet walking up steps
October is Cybersecurity Awareness Month. We think it should be Cybersecurity ACTION Month! Overhauling your security can be intimidating, but here’s how you can start off small.
A hand holding $100 bills on fire
Ransomware is becoming increasingly prevalent, and no company is immune. Here’s how to protect your business from a cyberattack, and why you shouldn’t pay a cyber ransom.
Red Sentry was named one of Infosec’s Products of the Month, highlighting our automatic pen testing and attack surface analysis as market differentiators.