SECURITY BREACH? CALL 888.234.5990 EXT 9999

Category: CYBERSECURITY

CYBERSECURITY

Cybersecurity Roundtable: How to Secure & Govern Generative AI

WEBINAR Meet The Presenters Rich Lilly Field CTO, Security Rich Lilly has been working in the IT Consulting space for 20+ years in various positions and roles, including Architect, Director of Pre-Sales, Cloud Evangelist, and Director of Security for Netrix, LLC. Rich brings extensive hands-on and practical knowledge to not

Read More »
CYBERSECURITY

Embracing Zero Trust Architecture in 2025

BLOG ARTICLE In today’s rapidly evolving digital landscape, traditional perimeter-based security methods are no longer sufficient to combat increasingly sophisticated cyber threats. Businesses face more diverse threats than ever, from remote workforce vulnerabilities to advanced persistent threats (APTs). To address these challenges, organizations are shifting toward a Zero Trust Architecture

Read More »
CYBERSECURITY

Beyond the Bare Minimum: What to Truly Expect from Your MDR Provider

BLOG ARTICLE In today’s escalating threat landscape, the need for robust cybersecurity is paramount. Many organizations are turning to Managed Detection and Response (MDR) services to augment their security posture. While the promise of 24×7 monitoring and threat detection is a common thread among MDR providers, it’s crucial to understand

Read More »
CYBERSECURITY

Multi-Factor Authentication (MFA) Bypass Demo

SIMULATED ATTACK Meet The Hacker Alex Shi Managing Consultant, Red Team Lead Alex manages the Offensive Security team at Netrix. He has diversified experience working within IT operations, security program management, and hands-on security testing engagements. Alex continuously maintains the technical skillsets required to collaborate with front-line IT teams, leading

Read More »
CYBERSECURITY

Navigating the New Wave of MFA Bypass Attacks in 2025

BLOG ARTICLE Multi-Factor Authentication (MFA) has become a cornerstone of modern cybersecurity, offering an additional layer of defense against unauthorized access. However, as security measures evolve, so do cybercriminal tactics. In 2025, we’re witnessing a surge in sophisticated MFA bypass attacks leveraging inherent authentication weaknesses, resulting in privileged access, corporate

Read More »
CYBERSECURITY

Palo Alto Firewall Exploit

SIMULATED ATTACK Meet The Hacker Alex Shi Managing Consultant, Red Team Lead Alex manages the Offensive Security team at Netrix. He has diversified experience working within IT operations, security program management, and hands-on security testing engagements. Alex continuously maintains the technical skillsets required to collaborate with front-line IT teams, leading

Read More »
CYBERSECURITY

Cybersecurity Basics: How SMBs Can Slash Risk with Simple Steps

BLOG ARTICLE As a Virtual Chief Information Security Officer (vCISO) working with small and medium-sized businesses (SMBs), I’ve seen firsthand how overwhelming cybersecurity can feel. With limited budgets, lean teams, and a constant barrage of threats, it’s tempting to think that only complex, expensive solutions can keep you safe. The

Read More »