Our Blog

RSS

We have reached a state of data overload. Not too long ago “big data” just seemed like a buzz word thrown around to scare people into needing more tools to digest and consume the data overload within the organization. Now, big data has…

Read More

By: Jonathan Sander A new breach at a major hotel chain hit the headlines recently claiming “Thousands of Guests' Data May Have Been Hacked at Starwood, Marriott, Hyatt Hotels.” But how new is this? The attack used malware to collect data from point…

Read More

Continuing with my Getting Physical blog posts series (CanSec2016’s presentation), in this third episode I’m going to talk about how Windows Paging is related to the HAL's heap and how it can be abused by kernel exploits. This is probably the simplest way of abusing Windows paging structures, because deep…

Read More

In the past week I’ve mentioned a Black Hat talk showing that dropped USB flash drives are still stupidly effective means for getting into networks. My colleague Brittany Thomas brought it up again in her Penetration Testing 101 piece last week, so I…

Read More

I read somewhere that your security is only as good as the measures you use to test it, which makes sense, and which explains the shift we have seen in the past few years in the security market. Penetration testing, aka ethical hacking,…

Read More

Getting home from what we affectionately call Security Summer Camp is almost as much of an adventure as attending the conferences. Getting caught in the Deltapocalypse on the way home just added to the fun. If you want a real challenge, try seeing…

Read More

Most cyber-attacks take place in only five moves. Learn how to counter bad actors with five moves of your own to detect, deter, and remediate risks in your organization. Request a Demo and see where you can use these counter-moves in your organization!

Read More

  By: Venkat Rajaji, SVP Marketing In the past, penetration testing was a fancy name for breaking through a network firewall. However, as technology advances and breaches become even more dangerous – costing an average of £2.53 million, according to research sponsored by IBM –…

Read More

According to the Verizon Data Breach Report over 80% of breaches were due to stolen or misused credentials. This shows us that our access credentials are more valuable than ever which means that being able to locate our high risk access accounts has…

Read More

As you heard from Bobby last week, it is that special time of the year, Black Hat, when all of our friends are gathered together in Vegas to see just what hacks, exploits, tips and tricks there are for us to be concerned…

Read More