Critical Path Security Grows!

We couldn't be more excited to announce two new additions to the Critical Path Security team! Virginia Kelley - Senior Accounts Manager / Women In Technology Outreach Virginia has been quietly working behind the scenes in the Information Security industry for nearly a decade.  She is a regular attendee at DEFCON where she volunteered in the Packet Hacking Village two years in a row. Additionally, she led all efforts for Critical Path Security's involvement in BSides Atlanta in 2018 and co-wrote Patrick Kelley's "CyberZoology" presentation, which has been presented over 25 times in 4 countries. She has attended or spoken at several security conferences in the United States and Canada and was most recently published on multiple news sites about becoming an Information Security Professional in a male-dominated field and Mental Illness Advocacy. Virginia Kelley is an incredibly valuable addition to Critical Path Security, where she will have dedicated time…

Comments Off on Critical Path Security Grows!

One Million Devices Open to Microsoft BlueKeep Flaw

Researchers have discovered one million internet connected devices that are vulnerable to a Microsoft flaw, which could open the door to a cyberattack. The flaw (CVE-2019-0708) was fixed during Microsoft’s May Patch Tuesday Security Bulletin earlier this month. System administrators were urged to immediately deploy fixes as the flaw could pave the way for a similar attack on the scale of WannaCry. Making matters worse, a spike in scans for vulnerable systems was spotted over the weekend – potentially indicating that bad actors are looking to sniff out the activity. The critical remote code-execution flaw exists in Remote Desktop Services and impacts older version of Windows, including Windows 7, Windows XP, Server 2003 and Server 2008 (Microsoft deployed patches to Windows XP and Windows 2003 for the bug during Patch Tuesday, neither of which is still supported via monthly Patch Tuesday updates). While Microsoft urged administrators to update impacted Windows…

0 Comments

New Platform Release: Warrior’s Code

Today's release started out with just a handful of new features planned, but as usual, the team just couldn't help themselves from going all in. Perhaps it was the release name that inspired them to challenge themselves; if so we will need to add more battle oriented release names to our road-map because the end result is incredible! Critical Path Security is very proud to announce the latest release of Léargas, Warrior's Code! Cloud Based Hosts - Our clients can now include their hosted Windows and Linux servers into the Léargas monitoring sphere, increasing visibility and confidence in their cloud based ecosystem's security configurations! SIP Traffic - Voice over IP isn't anything new, but many network monitoring platforms lack even basic visibility into this vast data-set. Léargas lifts the curtain on SIP Traffic giving our customers the ability to view, aggregate, monitor and alert on detailed call information. Finally a…

0 Comments

Critical Path Security expands managed services to include, “Executive Cyber Protection”!

In today’s society, personal safety, security, and privacy are legitimate concerns. As a solution to the growing problem, Critical Path Security established an Executive Cyber Protection Program for offering executive cyber protection and security to select clients, including High Net Worth Individuals (HNWI) and Ultra High Net Worth Individuals (UHNWI). Our custom designed services are strategically developed, planned and implemented by a blend of cyber security experts to provide peace of mind to our clientele. Critical Path Security specializes in offering discrete executive cyber protection and security services while protecting our client’s anonymity. Our Cyber Security Professionals are experts in planning, threat assessments, threat monitoring, crisis management, and providing emergency incident response. We understand that Executive Cyber Protection requires much more than surrounding a client with well-trained Cyber Security Professionals; our team rely on perpetual monitoring and threat assessments that identify potential risks in order to prevent an incident before it occurs.…

0 Comments
Close Menu