Blog

Improve Your Argument to Move Past Cybersecurity FUD

In the past year, we saw tremendous growth in cybersecurity, with many new professionals entering our industry. Looking to 2023 and beyond, I expect even more growth. It’s always interesting to see newcomers find their own position on cybersecurity drivers, many of...

read more

Risk Assessments in Everyday Life

Risk Assessments in Everyday Life  At NuHarbor, our Security Advisory experts specialize in risk assessment and consciously think about risk every day. Sometimes this is good, like when a friend extends the invite to go cliff jumping or skydiving in Mexico. Other...

read more

The Path to Improve Your Application Security Posture

“Software is eating the world.” – Marc Andreessen (Wall Street Journal, 2011) Application security (AppSec) is the most misunderstood and underserved security challenge facing every organization, security team, and developer. No matter your perspective, the perceived...

read more

Recruiting Your Best Security Partner

When an organization reaches a certain size or adopts a more strategic role for security in their planning and operations, they look for a Chief Information Security Officer (CISO) who can act as an advisor and a bridge between cybersecurity teams (and challenges) and...

read more
Ubuntu Server Hardening Guide

Ubuntu Server Hardening Guide

Original Author: Hunter Gregal Updated By: Justin Fimlaid ***NOTICE*** To those reading this... 3/8/22: I think *most* of this information is still good but please be cognizant of the Ubuntu version numbers. There's some great comments at the bottom about additional...

read more
5 Tips to Secure Your Devices

5 Tips to Secure Your Devices

Why You Should Secure Your Devices Human error is the weakest link in cybersecurity. Individuals want to cut corners on devices they use for efficiency, especially ones that are used hundreds of times a day. Although it’s nice to open a phone by clicking one button,...

read more
What is Penetration Testing?

What is Penetration Testing?

Penetration Testing Penetration Testing, also known as “pen testing,” is an exercise in testing an organizations cyber security posture. While not the only step in securing an organization, it is a critical one that should not be overlooked. Penetration Testing is...

read more