Cyber Threat Alert: Abusing AZUREADSSOACC for Pivoting from On-Premises Active Directory to Azure
Learn how threat actors exploit AZUREADSSOACC to pivot from on-premises Active Directory to Azure. Get actionable defenses to secure your hybrid identity environment.
Posted on Mar 19 / 2025
Managed Firewall Services: Enhancing Security and Simplifying Operations
Discover how Managed Firewall Services enhance cybersecurity, reduce complexity, and ensure compliance with 24/7 expert management and proactive threat prevention.
Posted on Mar 11 / 2025
Zero Trust in Identity and Access Management: Best Practices, Challenges, and How to Get Started
Learn how Zero Trust enhances Identity and Access Management (IAM) with best practices, real-world challenges, and practical steps for a seamless implementation. Secure your organization with Echelon's expertise.
Posted on Mar 05 / 2025
Cyber Threat Alert: Sophisticated Social Engineering Attacks Leverage Legitimate Microsoft Tools and Services to Deploy Ransomware
Discover how sophisticated social engineering attacks are leveraging legitimate Microsoft tools and services to deploy ransomware. Learn about recent phishing campaigns, Microsoft Teams vishing and effective cybersecurity measures to protect your organization.
Posted on Mar 04 / 2025
The Security Paradox: Flaws in DeepSeek Expose Industry-Wide AI Safety Challenges
DeepSeek R1’s security flaws highlight critical AI safety risks, from data exposure to adversarial attacks. Learn how vulnerabilities in open-source AI models compromise cybersecurity and what mitigation strategies organizations should adopt.
Posted on Feb 13 / 2025
Fortify Your Business with Echelon’s Next-Generation Managed Defensive Security Services
Explore Echelon Risk + Cyber's Managed Defensive Security Services, a comprehensive suite protecting your organization with expert-led solutions for Microsoft 365, cloud security, threat management, and firewalls. Download checklists and capabilities overview briefs to strengthen your defenses.
Posted on Jan 23 / 2025
2024's Must-Read: Top 5 Cybersecurity Articles You Can't Miss
We’re excited to share the 5 most-read articles of the year. These articles stand out for their relevance, depth, and impact on the ongoing cybersecurity dialogue. Whether you’re a seasoned pro or just starting to dive into the world of cybersecurity, these pieces offer valuable perspectives on the challenges and solutions facing today’s digital landscape.
Posted on Dec 18 / 2024
New PAN-OS Vulnerability Exposed: Steps to Defend Your Network
Learn more about the critical vulnerability found recently in the PAN-OS management interface by the CISA.
Posted on Nov 21 / 2024
Best Practices for Role-Based Access Control (RBAC)
In today’s digital world, managing access is essential for security, efficiency, and compliance. Role-Based Access Control (RBAC) simplifies this by assigning roles and granting access based on those roles, rather than individual permissions. This ensures consistent, well-managed access across the organization, making RBAC one of the most effective security methods. In this article, we'll explore RBAC, its implementation challenges, and practical tips for maintaining an effective system as organizations scale.
Posted on Nov 13 / 2024
Expert Insights for Cybersecurity Awareness Month: Strategies to Enhance Protection
Discover expert strategies from Echelon to enhance your organization's cybersecurity during Cybersecurity Awareness Month. Learn about training enhancements, cyber exercise benefits, internal testing, and building a culture of awareness to strengthen cyber defenses.
Posted on Oct 01 / 2024
Network Vulnerability Basics: Securing Every Layer of the OSI Model
The OSI Model, or Open Systems Interconnection Model, is a way to break down how networked devices communicate into seven layers. It was developed in the late ‘70s and published by the International Organization for Standardization (ISO) in 1984. This article details the vulnerabilities and recommended remediations of each layer of the OSI model. It will be helpful for anyone just starting their cybersecurity career, as well as a refresher for our long timers.
Posted on Sep 25 / 2024
The Language Revolution: Enhancing Cybersecurity with Large Language Models
In this article, Renata Uribe Sánchez explores the transformative impact of large language models (LLMs) in the field of cybersecurity. LLMs, particularly Transformers, are powerful tools within deep neural networks that can interpret and generate natural language, making them invaluable in various applications. The article discusses the benefits of integrating LLMs into cybersecurity, including advanced threat detection, phishing prevention, malware detection, and investigative data analysis. It also highlights the challenges associated with biases, AI-driven hacking, and data privacy.
Posted on Sep 18 / 2023
Busting Myths about Microsoft 365 Security (Healthcare Edition)
Uncover the truth about Microsoft 365 security in healthcare organizations. Learn why myths about security tools, Microsoft's default settings, third-party filters, and HIPAA certification can leave your organization vulnerable.
Posted on May 23 / 2023
Why Every Healthcare Organization Should Assess their Microsoft 365 Environment
Healthcare organizations should assess their Microsoft 365 environment to protect sensitive data and reduce cyber threats. Read on to learn more.
Posted on May 10 / 2023
Hacker's Perspective: A Modern Approach to Cross-Site Request Forgery
Learn how to locate and exploit Cross-Site Request Forgery (CSRF) vulnerabilities in modern web applications by understanding client-side and server-side code interactions, CSRF tokens, and SameSite cookie policies.
Posted on May 10 / 2023