BLOGS

- Apr 28, 2023
- Qakbot Continues to Menace Corporate Environments
- Learn more about Qakbots and how they evade detection.

- Mar 30, 2023
- Protecting Against Malicious USB Devices
- Learn more about a drop attack and how to detect them.

- Feb 9, 2023
- The Timeline of Security and The Secret to Why Cybersecurity Sometimes Fails
- Learn the role a timeline for security plays and how to avoid being easily hacked.

- Sep 30, 2022
- Bad Listening Harms Relationships and Cyber Programs
- Learn how Vigilant maintains secure networks & strong relationships with their secret weapon - listening.

- Jul 27, 2022
- Quick Security Wins for $0
- Learn how Vigilant has discovered simple and easy ways to combat ransomware attacks at no-cost.

- Apr 8, 2022
- Why US Based SOCs are Important to US Based Companies
- Learn why Vigilant is committed to having an all US-Based SOC and the importance of it.

- Feb 24, 2022
- FIRST TO DETECT BUT NEVER PUBLICIZE
- Learn how Vigilant discovered a Microsoft Exchange vulnerability before Microsoft with our Adaptive Intelligence Process.

- Jan 13, 2022
- GREAT SECURITY SOLVES UNEXPECTED PROBLEMS
- Learn how great security solves unexpected problems, shortens timeframes, and minimizes costs.

- Jan 11, 2022
- Recent Attacks Require An Updated Mindset
- Learn about the mindset that needs to developed in order to combat modern cyber attacks.

- Jan 3, 2022
- DIFFERENCE BETWEEN VULNERABILITY SCANNING AND PENETRATION TESTING
- Learn the differences between Vulnerability Scanning, Penetration Testing, and Red Teaming while learning which is best for your company.