In this first blog about port security, we will go over the basics of what are ports and why it’s important to secure them. If you’re already well-versed in the concept of port, jump to our second...
Cowbell Labs
Your information is on the dark web, now what?
The dark web has become known as a place where cybercriminals resell stolen sensitive information, including emails, usernames, passwords, financial information, etc. If you find your information on...
How to secure your web browser (Google Chrome, Microsoft Edge, Firefox)
There are several great reasons to consistently update your web browser to the most recent version, such as having faster running browsers and additional features. However, the most important reason...
Log4j vulnerability: How to use the Crowdstrike Active Scan Tool (CAST)
The recently discovered Log4j vulnerabilities have serious potential to expose organizations across the globe to a new wave of cybersecurity risks. Bad actors can exploit this vulnerability by...
Why did Log4j cause the Internet’s fire alarm to go off?
Understanding the Log4j Vulnerability Over the last week IT administrators, security professionals, C-Suites, and government entities have been scrambling to respond to a cybersecurity vulnerability...
Cowbell Blog
Grow your cyber IQ with our insights into cyber insurance, cyber risk, and cyber security.