sarahbullard (25)in #attacksurface • last year7 Best Practices & Strategies for Attack Surface ReductionImagine a team racing against the clock to locate a fresh inventory of assets, their actions resembling a game of luck…sarahbullard (25)in #ipgeolocation • 4 years agoGetting Started with IP Geolocation Database DownloadKnowing users’ geolocations is beneficial for various purposes, including marketing, brand and customer protection…sarahbullard (25)in #emailvalidation • 4 years agoEmail Validation and Other Ways to Identify Suspicious or Abusive Email AddressesMany cyber attacks begin with an email from either an unknown individual or someone posing as your contact from a…sarahbullard (25)in #newlyregistereddomains • 4 years agoHow Prevalent Are Newly Registered Crypto-Related Domains? How Do You Find Them?More and more articles about cryptocurrency have been cropping up lately, most likely due to news of people striking…sarahbullard (25)in #disposabledomains • 4 years ago3 Ways to Use Email Verification to Mitigate Business and Cybersecurity RisksSpam and phishing may be age-old threats but as many of today’s cyber attacks, which typically get into target…