Skip to main content

October 05, 2018

ATT&CK’s Initial Access Adversarial Tactic

By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations ...

See Details

September 28, 2018

Intro to Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™ Series)

This series is focused on the risk associated with attacks which leverage vulnerabilities that could have been mitigated through the implementation of...

See Details

July 31, 2017

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 20

Test the overall strength of an organization’s defenses (the technology, the process and the people) by simulating the objectives and actions of an at...

See Details

November 04, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 14

The processes and tools used to track/control/prevent/correct secure access to critical assets (e.g., information, resources, and systems) according t...

See Details

October 21, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 13

Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

See Details

September 22, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 12

Detect/prevent/correct the flow of information transferring networks of different trust levels with a focus on security-damaging data.

See Details

July 07, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 8

Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enab...

See Details

June 22, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 7

Minimize the attack surface and the opportunities for attackers to manipulate human behavior through their interaction with web browsers and email sys...

See Details

June 16, 2016

Top 20 CIS Critical Security Controls (CSC) Through the Eyes of a Hacker – CSC 6

Collect, manage, and analyze audit logs of events that could help detect, understand, or recover from an attack.

See Details