
November 27, 2018
If we were to relate the Grinch to cyber security terms, we’d call him a quintessential threat actor. His sole focus is finding a way to stop....
Blog

November 20, 2018
Ah, Thanksgiving. Time to breathe, greet the holidays and revel in a few days off, time with family, and…what’s that call on your cell? “Suspicious....
Blog

November 15, 2018
By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations....
Blog

ATT&CK Series: Process Injection, Bypass User Account Control, Exploitation for Privilege Escalation
November 06, 2018
By far the best way to prevent a security incident is to prevent the initial access from being obtained in the first place. This is why organizations....
Blog

October 31, 2018
Computer security professionals are all too familiar with the “cat and mouse” game seen on the global stage of the enemy and defenders. History does....
Blog

October 30, 2018
In the previous post of this two-part series, we introduced the concept of blockchain and its possible use cases. Blockchain innovation promises....
Blog

October 29, 2018
Merchants often put compliance spending at the top of their list for budgeting purposes because the consequences of non-compliance can be expensive....
Blog

October 23, 2018
There has been a lot of hype around “blockchain” these past few months. After attending sessions, discussing it with others, and researching how it is....
Blog

October 18, 2018
Extracting data from memory chips is always an exciting part of any hardware assessment. I have a few chip readers at my disposal which can do the....
Blog

October 16, 2018
It’s important to understand the perspective of both the business and the security leader. Merchants invest heavily in PCI compliance and it’s money....
Blog

October 15, 2018
If you were to gather ten cyber security experts in a room and ask them what the most common threat actor access point is for today’s enterprise....
Blog

October 10, 2018
Fantasy football and information security have more in common than you think. Both are all about planning, scenarios and virtual practice. But the....
Blog