Remote Access Done Right
Do you have resources on prem? In the cloud? How about in multiple clouds? How do you access them...
Do you have resources on prem? In the cloud? How about in multiple clouds? How do you access them...
If anyone in your organization handles financial transactions, invoices, or payroll changes over...
Recon InfoSec, an industry-recognized leader in Managed Detection & Response, cybersecurity...
With the ongoing conflict in Ukraine and U.S. sanctions against Russia continuing to build, the...
As many in the industry are now aware, Okta experienced a form of security breach back in January...
At Recon, we are committed to meeting the security demands of the evolving threat landscape and...
In this blog post we cover a widespread phishing campaign Recon recently observed targeting...
This guide will walk you through using CanaryTokens.org to generate a token and how to use that...
The recent Log4j vulnerability (CVE-2021-44228) is unprecedented in its global scope and impact....
In July, Eric & Whitney gave a talk titled "Breaches Be Crazy" at the SANS DFIR Summit outlining...