Blogs

Blog Image

Testing a Flutter Application

As your app gets bigger, a good set of tests may help you save time, as tests can find new bugs that could appear with normal modifications.

Blog Image

Cracking NTLMv2 Hashes with Cthulhu

Why Password Managers and MFA are Important in your Security Stack

Blog Image

Cybercriminals Going after K-12? Yep, It’s a Thing.

Louisiana Governor John Bel Edwards has issued a state of emergency due to a malware attack against several local schools in the Sabine, Morehouse, and Ouachita Parishes, in northern Louisiana.

Blog Image

Mid-Year Check-In: 2019 Cybersecurity Predictions

Back in early January, I teamed up with my colleague, Jordan Mauriello, to write five cybersecurity predictions for 2019.

Blog Image

Tackling the Cybersecurity Talent Shortage, One Alert at a Time

Reducing alert overload by integrating zero-trust technology as part of your security posture can help solve the headcount problem.

Blog Image

Drowning in Alerts? CRITICALSTART, Microsoft Defender ATP Collaboration Will Reduce Alerts by 99%

The rapidly changing threat landscape poses numerous challenges for all enterprise organizations.

Blog Image

Law Firms Beware: Data Breaches on the Rise

If your law firm hasn’t been breached, chances are very high it will.

Blog Image

The Last Watchdog Talks to CRITICALSTART About Radical Transparency

At CRITICALSTART, we’ve made the concept of “radical transparency” a cornerstone of our