Posts by Zoe Lindsey
Vulnerabilities in Cleo Software Allow for Unauthenticated Remote Code Execution via CVE-2024-55956
What Happened On December 9th, Huntress released a threat advisory reporting a vulnerability and active exploitation of the file transfer management software offered by...
Read MoreAbout the Author
Zoe Lindsey is a Security Strategist at Blumira with over a decade of experience in information security. She began her infosec career at Duo Security in 2012 with a background in medical and cellular technology. Throughout her career, Zoe has advised organizations of all sizes on strong security tactics and strategies. As a sought-after speaker, she has shared best practices and recommendations at industry-leading events including RSA Conference, SecureWorld, and Cisco Live. When she’s not championing smart security on stage, you can usually find Zoe behind her turntables rocking dancefloors from San Francisco to New York as her alter ego DJ Selina Style, including notable appearances at DEF CON and SXSW.
On-Demand - Detection and Response Decoded: From AV to XDR
Read MoreOn-Demand - Election-Inspired Incident Response: Lessons from Real-Life Scenarios
Read MoreFear, Uncertainty, and Helplessness in Cybersecurity
Read MoreStrengthening Security Posture Through People-First Engagement
Read MoreNormalizing Security Culture: You Don't Have to Get Ready If You Stay Ready
Read MoreBuilding a security-first culture for MSPs: Always ready, always protected
Read MoreImplementing Tabletop Exercises for Supply Chain IT and Cybersecurity Management
Read MoreBlumira Domain Security Assessment Video
Read MoreMastering Your Domain With the Free Domain Security Assessment from Blumira
Read MoreOn Demand - Tabletop Exercises: Improve Your Practice for Better Incident Response
Read MoreOn Demand - How Updated CIS Controls Help Safeguard Public Utilities and Government Agencies
Read MoreI Can SIEM Clearly Now, the Pain is Gone (with Rapid SIEM Deployment)
Read MoreOn Demand - Blumira's Latest Changes Streamline Security, from Payment to Response
Read MoreOn Demand - Cybersecurity Essentials: Protecting Your Business Without Breaking the Bank
Read MoreSmall Business, Big Risk: Decoding NIST's Strategy for Mid-Sized Business Security
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.