The New State of Side Channel Attacks

Written by:  Blair O’Toole  Technology Business Engineer  NET Xperts LLC I know we have all been bombarded with stories of the current fast-paced state of AI (artificial intelligence) and how it could impact the business world. Many ideas have been presented and explored, but I would like to talk about a more specific example of how this could affect network […]

Making a Cybersecurity House a Safe Home

Written by:  Joel Caskey  Cybersecurity Manager & Partner  NET Xperts LLC Greetings, Cybersecurity Superheroes! Throughout the month this month, we’ve talked about a few different concepts to strengthen your cybersecurity posture and to build and maintain that Cybersecurity House. This isn’t the full picture, but it gives you an idea of some of the basic concepts that you can do […]

Have a Solid Framework and Foundation

Written by:  Joel Caskey  Cybersecurity Manager & Partner  NET Xperts LLC Greetings, Cybersecurity Superheroes! Picture this for a moment – you’re relaxing in your Cybersecurity House, and you’ve implemented a lot of the concepts that we’ve already talked about. You feel safe and secure. Suddenly you’re attacked in your kitchen by a family of hornets. These hornets are just out […]

Man in the Middle Attacks

Written by: Joel Caskey Senior Technology Business Engineer NET Xperts LLC When you were younger, did you ever play the game “Monkey in the Middle”?  That infamous game where 2 people throw a ball back and forth and try to keep the “man in the middle” from getting the ball has been around for a very long time.  I’m sure […]

What Is A Zero-Day Vulnerability? How Can Your Protect Against It?

Written by: Michael Williams Technology Business Engineer NET Xperts LLC With companies trending towards their business relying on cloud computing and infrastructure for day-to-day operations, software as a service is as essential as ever. While relying on third-party companies to manage your software may seem like a great way to mitigate headaches and risks, there exists one consistent threat in […]