Recent Posts

Categories

See all

Archives

See all

TNP Blog

Password Reuse is One of The Weakest Points in Cybersecurity

It comes as no surprise that cybersecurity is a growing threat and something that is only getting worse as more companies rely on remote workers and virtual environments to keep their operations going. For cybercriminals, there are a number of

Read more

First CMMC Assessment Organization Approved

In the past few years, we have witnessed an incredible surge in cybercrime and cyber-attacks targeted towards both individuals and businesses. Organizations of all sizes have been victims of a wide variety of attacks.

Read more

Cross-Industry Technology Trends That Will Disrupt the World

Technology is changing at a rapid pace, much faster than it has ever evolved before. More importantly, the kind of technology that we are witnessing today is far more revolutionary and even disruptive than what we have seen in the past. Whether

Read more

Under Pressure - COVID-19 Forced Many Execs to Sideline Cybersecurity

The current digital environment isn't looking good for anyone from a security point of view yet even those who are expected to be at the forefront of this problem are also having a tough time handling the situation.

Read more

Threat Actors Weaponize Telegram Bots to Compromise PayPal Accounts

Just recently researchers have discovered a campaign that has been operational since June 2021, which has secretly been exploiting Telegram bots to compromise the banking information of users. More specifically, the campaign is stealing the

Read more

NIST Brings Threat Modeling into the Spotlight

Threat modeling hasn't always gotten the recognition that it deserves but the recent Recommended Minimum Standard for Vendor or Developer Verification of Code by the National Institute of Standards and Technology (NIST) is taking a big step in

Read more

Why Purple Teaming?

Any modern cyber security organization, and even generally an organization that has a solid cyber security infrastructure, will be using the red team and blue team model to improve their digital security.

Read more

A Modern Approach to Protecting Against Web Threats

Just like technology, cybersecurity is growing in complexity and sophistication with every passing day. To add to this, the dynamics of the digital workspace have also completely changed in the past couple of years. People are working remotely,

Read more

What Is Ransomware as a Service and Why Is It Booming?

You’ve probably heard of SaaS businesses where SaaS stands for software-as-a-service. These businesses offer some type of software on a monthly subscription basis, thus providing value to their users while generating a steady stream of profits.

Read more

Artificial Intelligence in Cybersecurity: Pros and Cons

Due to the rapid growth of the technology industry, data exchange is happening on a bigger scale between multiple systems. The latest trend in cybersecurity is to use artificial intelligence and machine learning for better defense.

Read more

Recent Posts

Categories

See all

Archives

See all