In today’s episode, we cover two important data models and their applicability to security. I am talking about data lake and data warehouse. I will look into their similarity, differences and practical considerations surrounding these two...
This is episode 2 of on how how exactly cybercriminals join forces for profit. Make sure you caught up with episode 1 first before you listen to this episode.Lets continue demystifying their collaborative nature.But before that, we will recap...
It is true, there is no loyalty between criminals but there is a profit to be made between them.How exactly cybercriminals join forces for profit? We will answer that question in this week’s episode as we uncover the secret collaborations of...
The ATT&CK Navigator is a web-based tool created and maintained by the Mitre organisation. The tools is used for annotating and exploring ATT&CK matrices. It is often used to visualize defensive coverage, red/blue team planning, the...
In this week’s episode we will continue with Part 2 on Demystifying Digital Certificates.To take the most out of this week’s episode – If you have not listen to Part 1, I suggest you listen to the first before you listen to this...
In this episode, I want to shine a brigt light on an important yet frequently misunderstood part of online security: digital certificates. Certificates are essential in today’s digital world for safeguarding communication and confirming...
A great piece on what it will take to improve the safety of the connected world. Read it here.
Extended detection and response (XDR) captures threat data from previously isolated security tools throughout the organizations tech stack to enable easier, faster triage and efficacy in investigation, threat hunting, and accurately responding to...
Organizations are increasingly considering response capabilities within NDR solutions for dealing with threats detected through network traffic analytics tools, which are mostly focused on only detecting threats, and are largely focused around the...
A new malware kit to compromise ISC (Industrial Control Systems) is detailed in this whitepaper by Dragos.