Skip to content

Blog Archive

How Does a Firewall Work?

Cybersecurity has evolved by leaps and bounds these last few decades, with cutting-edge technologies like AI and machine learning powering next-generation security solutions. Traditional security controls like antivirus have been superseded by intelligent anti-malware controls that can analyze the behavior of files for malicious activity. However, one control has remained a permanent fixture within companies: the firewall. While newer and more advanced functionalities have been added to firewalls, their primary role as the barrier that allows or disallows traffic into a network has remained constant.

Adam Burke

Why Ransomware Organizations Target Local Active Directory

Active Directory (AD) is an invaluable tool for modern-day organizations, especially as interconnectedness and instant data access become more crucial than ever before; however, AD is also a major target for cyber criminals, especially ransomware organizations. With increasingly advanced attacks zeroing in on AD infrastructures at an alarming rate, it is massively important for organizations to better understand the anatomy of these ransomware active directory attacks.

Tim Burke

Malware vs. Ransomware: 5 Key Differences

It is not uncommon for the terms “malware” and “ransomware” to be used interchangeably, often creating confusion. However, understanding the crucial distinctions between these two forms of cyber threats is essential to implementing robust cybersecurity measures.

Tim Burke

Why You Should be Using a Password Manager

We live in an increasingly digital world, and the security of our virtual identities has never been more critical. Our digital footprint can extend over countless platforms, from online banking to social media to business applications and more. As our identities grow in number, it can become a logistical nightmare to keep track of them and manage all their passwords. People must make passwords unique and strong to prevent having their accounts compromised, but doing this makes it difficult to remember and keep track of them all. One smart solution to this problem is to use a password manager.

Mike Dillon

How Can You Be Sure Your Cybersecurity Strategy Is Effective?

We live in a digitally connected world with sophisticated cyber threats emerging daily. In this era of advanced cyberattacks, having a formalized cybersecurity strategy is no longer a luxury but an absolute necessity. CISOs and Cybersecurity Leaders need to create and refine roadmaps for the future that focus their security efforts and justify spending.

Adam Burke

What is Privileged Access Management?

For organizations across every industry, maintaining secure and controlled access to critical systems and resources is paramount. One essential tool in this quest for enhanced cybersecurity is Privileged Access Management, or PAM. But what is PAM? And why should it matter to your organization?

Tim Burke

Contact Quest Today  ˄
close slider