Want to know what 3rd Party Enterprise Apps are, what role they play in your #cybersecurity health, how #threatctors leverage them, and how to prevent them from being abused? Read on for some insight from Pileum Corporation's SRC Team member, Michael Medlin! #cyberrisk #O365
Pileum Corporation
IT Services and IT Consulting
Jackson, MS 1,755 followers
We are leading-edge innovators combining industry knowledge, experience, and technology skills to help our clients grow.
About us
PILEUM is an IT Consulting and Systems Integration firm. We are leading-edge innovators, combining industry knowledge, functional experience, and technology skills to help our clients grow and create extraordinary value in their businesses. We come to our clients with the freedom to choose what is best for their particular situation. Our experience from a broad range of industries allows us to use creativity, objectivity, and analytical methodologies in solving problems and/or creating new opportunities. Pileum's mission is to enhance our clients'' profits through business process improvement, service differentiation, and technology based solutions. We solve business problems by improving business practices and technology. We don’t believe every problem requires a capital expenditure to solve. We don't believe in selling cool technology just because it's cool. Technology should be used to make a business more profitable either by saving the customer money, by making a business more efficient, or by allowing a business to provide better service.
- Website
-
https://www.pileum.com
External link for Pileum Corporation
- Industry
- IT Services and IT Consulting
- Company size
- 11-50 employees
- Headquarters
- Jackson, MS
- Type
- Privately Held
- Founded
- 2002
- Specialties
- network engineering, IT support, Information Technology, project management, Cisco, Microsoft, Riverbed, Dell Equallogic, HP, Symantec, Cylance, BodyWorn, Email Services, Cloud Services, Disaster Recovery Planning, IT Consulting, IT Security and Forensics, Server/Desktop Virtualization, Storage Area Networks, and Data Center Design
Locations
-
Primary
190 E Capitol Street
Suite 175
Jackson, MS 39201, US
-
8870 Cedar Springs Ln
Suite 208
Knoxville, TN 37923, US
Employees at Pileum Corporation
Updates
-
Pileum is excited to partner with Arctic Wolf to bring you an informative webinar on business email compromise mitigation and prevention. Register today and join us on July 10 at 11AM CST! Arctic Wolf https://lnkd.in/eiFCmD5M
-
Pro tip: This only helps if you aren't still on #windows10...or...#windows7...or...#windowsXP... #cybersecurity #vulnerabilitymanagement #riskmanagement
Maybe the death of NTLM? If so, good news for the good guys. #cybersecurity #windows11 https://lnkd.in/gwbVC5bm
Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses
thehackernews.com
-
Register today for an informative webinar presented by Barracuda and Pileum, and enter for an opportunity to win a gift card! Protect your business from the top 13 email threat types, including the sophisticated ones designed to slip through your secure gateway. Don't miss out - Register Today! https://lnkd.in/e_E87FpS
-
-
#vulnerable #rdp and #phishing campaigns are the primary methods for gaining access.
Major uptick in #cyberattack activity from these #threatactors as of late. #cyberriskmanagement #cybercrime
How MedusaLocker Ransomware Aggressively Targets Remote Hosts
sentinelone.com
-
Does your organization have a functional, tested and trained #incidentresponse plan to lean on? Does it satisfy your #cyberinsurance underwriting requirements and meet any other #cyber legal or #regulatorycompliance requirements that you have?
Interesting approach by a #ransomware #threatactor. Report the publicly traded company to the Security Exchange Commission for not disclosing a breach. How many of you find #cyberevent reporting rules/laws to be clear? I find that many don't clearly define the difference between event, incident and breach. The result is a rule that is almost impossible to comply with. Some reporting requirements demand an announcement in a time frame that couldn't possibly allow proper forensics to even determine what happened/is happening. On the other hand, some entities could discover a threat actor in their datacenter with a blowtorch and they wouldn't call the fire department for fear of bad press... https://lnkd.in/d6KzvkU7
Ransomware gang files SEC complaint over victim’s undisclosed breach
bleepingcomputer.com
-
Happy to be a part of what Innovate Mississippi is doing!
Special thanks to our Accelerate 2023 Innovation Leader Sponsor, Pileum Corporation! Pileum Corporation is an IT Consulting and Systems Integration firm at the forefront of innovation. They bring together industry expertise, practical experience, and technology proficiency to support their clients in achieving remarkable growth and value within their businesses. Visit accelerate.innovate.ms to discover more about Accelerate 2023 and registration details. Don't miss out on this extraordinary event!
-
-
Good stuff!
I’m happy to share that I’ve obtained a new certification: Microsoft 365 Certified: Endpoint Administrator Associate from Microsoft!
This content isn’t available here
Access this content and more in the LinkedIn app
-
Pileum Corporation is moving some web services. While we wait on DNS records to propagate, you may get a "Site Not Found" message. If you need information, feel free to message us here.
-
We do #penetrationtesting that is not limited to a small subset of your network hosts. We provide clear, concise reporting that focuses on specific weaknesses and how to fix them. We do not just reiterate what your #vulnerabilitymanagement program is already telling you. We do all of this at a fraction of the cost of a typical limited scope #penetrationtest #cyberriskmanagement #cybersecurityconsultant
#friday #penetrationtesting #facts A common misunderstanding about internal #pentest is that the potential client "knows" they have "a bunch of old stuff" but "can't fix it". Typically this is because of some core application(s) that simply did not keep up with modern OS's, or they have been defeated by the #patchmanagement cycle. The fallacy of the assertion is that because you know you are behind, you understand all of your weaknesses. There is a BIG difference in knowing you have weaknesses, and knowing specifically what they are and how a #threatactor might achieve impact with them. The value of the pen test is that we can enumerate your #cyberrisks in way that each weakness can be considered independent of patching the entire OS or application. It is possible to reduce the potential #impact of #vulnerabilities by shoring up individual weaknesses and implementing appropriate compensating controls. That is simply impossible to do if your only view of your #networksecurity is that you have old stuff and can't do anything about it. #themoreyouknow #vulnerabilitymanagement #cybersecurity