
GoSec 2020 Goes Virtual
Retired Admiral James Stavridis headlines keynote speakers La Jolla, CA – GoSec, Canada’s leading information security conference and exposition,...
GoSecure Titan® Managed Extended Detection & Response (MXDR)
GoSecure Titan® Managed Extended Detection & Response (MXDR) Foundation
GoSecure Titan® Vulnerability Management as a Service (VMaaS)
GoSecure Titan® Managed Security Information & Event Monitoring (Managed SIEM)
GoSecure Titan® Managed Perimeter Defense (MPD)
GoSecure Titan® Inbox Detection and Response (IDR)
GoSecure Titan® Secure Email Gateway (SEG)
GoSecure Titan® Threat Modeler
GoSecure Titan® Identity
GoSecure Professional Security Services
Incident Response Services
Security Maturity Assessment
Privacy Services
PCI DSS Services
Penetration Testing Services
Security Operations
GoSecure MXDR for Microsoft
Comprehensive visibility and response within your Microsoft security environment
USE CASES
Risk-Based Security Measures
Safeguard sensitive information
Make informed decisions
Fulfill regulatory obligations
A valuable risk management strategy
Combat ransomware with innovative security
Halt zero-day exploits with advanced protection
Get ahead and win the race with the GoSecure Titan® Platform
24/7 MXDR FOUNDATION
GoSecure Titan® Endpoint Detection and Response (EDR)
GoSecure Titan® Next Generation Antivirus (NGAV)
GoSecure Titan® Security Information & Event Monitoring (SIEM)
GoSecure Titan® Inbox Detection and Reponse (IDR)
GoSecure Titan® Intelligence
ABOUT GOSECURE
GoSecure is a recognized cybersecurity leader and innovator, pioneering the integration of endpoint, network, and email threat detection into a single Managed Extended Detection and Response (MXDR) service. For over 20 years, GoSecure has been helping customers better understand their security gaps and improve their organizational risk and security maturity through MXDR and Professional Services solutions delivered by one of the most trusted and skilled teams in the industry.
EVENT CALENDAR
LATEST PRESS RELEASE
Retired Admiral James Stavridis headlines keynote speakers La Jolla, CA – GoSec, Canada’s leading information security conference and exposition,...
GOSECURE BLOG
GoSecure Titan Labs received a malicious Chrome...
Log4j was an eye opener for many here at...
GoSecure Ethical Hacker Maxime Nadeau shares his...
RESOURCES
SECURITY ADVISORIES
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
As part of our research on Cybersecurity Perceptions Versus Reality, we developed a survey in collaboration with Serene-risc, a knowledge mobilization network in cybersecurity based in Canada, on the perceptions and practices of cybersecurity professionals. The survey aimed at understanding how defenders perceive specific security measures and whether these measures were implemented in their respective organizations. We then combined the survey results with our penetration testing experience to confront two perspectives: the defenders’ and the pentesters’, the latter standing as proxies for real attackers. This blog post summarizes the results related to products’ features enabled by default that could represent a security risk.
As part of our research on Cybersecurity Perceptions Versus Reality, we developed a survey in collaboration with Serene-risc, a knowledge mobilization network in cybersecurity based in Canada, on the perceptions and practices of cybersecurity professionals. The survey aimed at understanding how defenders perceive specific security measures and whether these measures were implemented in their respective organizations. We then combined the survey results with our penetration testing experience to confront two perspectives: the defenders’ and the pentesters’, the latter standing as proxies for real attackers. This blog post summarizes the results related to patch management.
Unicode is the de-facto standard for multilingual character encoding. UTF-8 is the most popular encoding used that supports its hundreds of thousands of characters. Aside from the encoding (byte representation of characters), Unicode defines multiple transformations that can be applied to characters. For instance, it describes the behavior of transformations such as Uppercase. The character known as Long S “ſ” (U+017F) will become a regular uppercase S “S” (U+0053). Unexpected behavior for developers can often lead to security issues. Today, we will dive into the case mapping and normalization transformations. You will see how they can contribute to logic flaws in code.
As part of our research on Cybersecurity Perceptions Versus Reality, we developed a survey in collaboration with Serene-risc, a knowledge mobilization network in cybersecurity based in Canada, on the perceptions and practices of cybersecurity professionals. The survey aimed at understanding how defenders perceive specific security measures and whether these measures were implemented in their respective organizations. We then combined the survey results with our penetration testing experience to confront two perspectives: the defenders’ and the pentesters’, the latter standing as proxies for real attackers. This blog post summarizes the results related to password policies.
As part of our research on Cybersecurity Perceptions Versus Reality, we developed a survey in collaboration with Serene-risc, a knowledge mobilization network in cybersecurity based in Canada, on the perceptions and practices of cybersecurity professionals. The survey aimed at understanding how defenders perceive specific security measures and whether these measures were implemented in their respective organizations. We then combined the survey results with our penetration testing experience to confront two perspectives: the defenders’ and the pentesters’, the latter standing as proxies for real attackers. This blog post summarizes the results related to multifactor authentication.