tampabaytech2

Courtney H. Jackson — CEO of Paragon Cyber Solutions, family-night game champion, and calculated-risk taker

.fusion-content-boxes-1 .heading .content-box-heading {color:#212934;} .fusion-content-boxes-1 .fusion-content-box-hover .link-area-link-icon-hover .heading .content-box-heading, .fusion-content-boxes-1 .fusion-content-box-hover .link-area-link-icon-hover .heading .heading-link .content-box-heading, .fusion-content-boxes-1 .fusion-content-box-hover .link-area-box-hover .heading .content-box-heading, .fusion-content-boxes-1 .fusion-content-box-hover .link-area-box-hover .heading .heading-link .content-box-heading, .fusion-content-boxes-1 .fusion-content-box-hover .link-area-link-icon-hover.link-area-box .fusion-read-more, .fusion-content-boxes-1 .fusion-content-box-hover .link-area-link-icon-hover.link-area-box .fusion-read-more::after, .fusion-content-boxes-1 .fusion-content-box-hover .link-area-link-icon-hover.link-area-box .fusion-read-more::before, .fusion-content-boxes-1 .fusion-content-box-hover .fusion-read-more:hover:after, .fusion-content-boxes-1 .fusion-content-box-hover .fusion-read-more:hover:before, .fusion-content-boxes-1 .fusion-content-box-hover .fusion-read-more:hover, .fusion-content-boxes-1 .fusion-content-box-hover .link-area-box-hover.link-area-box .fusion-read-more, .fusion-content-boxes-1 .fusion-content-box-hover .link-area-box-hover.link-area-box .fusion-read-more::after, …

Courtney H. Jackson — CEO of Paragon Cyber Solutions, family-night game champion, and calculated-risk taker Read More »

How SOC 2 Automation Will Streamline Your Audit

How SOC 2 Automation Will Streamline Your Audit by: Stephanie Oyler-Rankin 01 Sep,2023 5 min A-SCENDSOC 2 Automation is fundamentally changing the way cybersecurity audits operate. Whether you are conducting your first audit or have been running them for years, it’s important to know what SOC 2 automation can and can’t do, and how it will help you …

How SOC 2 Automation Will Streamline Your Audit Read More »

Vulnerability in Ivanti Endpoint Manager Mobile Could Allow for Unauthorized Access to API Paths

.fusion-imageframe.imageframe-1 img{aspect-ratio:21 / 9;} I. Targeted Entities Ivanti Users II. Introduction Norwegian authorities recently revealed a critical zero-day vulnerability in Ivanti Endpoint Manager Mobile (EPMM), posing a significant security threat. The flaw enables unauthenticated remote attackers to bypass authentication and gain access to the server’s API, potentially leading to data theft and unauthorized system modifications. …

Vulnerability in Ivanti Endpoint Manager Mobile Could Allow for Unauthorized Access to API Paths Read More »

Scroll to Top