Resources

Article

Linux Flash for Newbies: How Linux Works with Flash

In the first series of this introduction to Linux and flash, we began with a basic lesson on flash memory. In part two, we can begin to tackle how Linux interacts with it. From this point forward, we’ll focus on NAND flash, with the following assumptions...
Article

Linux Flash for Newbies: Flash Memory Basics

During hardware-oriented engagements, we are sometimes faced with a hardware device's firmware image. This may happen because we downloaded a firmware upgrade image to try to understand a device with a view of finding security flaws...
Article

Bypassing CVE-2018-15442: Another Case of DLL Hijacking

As an exploit writer, one of my tasks consists of gathering common vulnerabilities and exposures (CVE) and all of the information related to them in order to design an exploit for Core Impact. As part of this process I stumbled across CVE-2018-15422: A vulnerability in the update service of Cisco WebEx Meetings Desktop App for Windows. 
Video

The Truth About Viruses on Linux

There are many myths about viruses and Linux—including the belief that the system is immune. A startling increase in malware, ransomware and malicious code targeting Linux systems of all shapes and sizes means the days of believing it’s “just a Windows thing” are over. In reality, Linux is becoming a lucrative target. It’s time to take action to protect your Linux environment and surrounding...
Video

Why Endpoint Antivirus Belongs in Your Security Environment

Most organizations are vigilant about scanning their workstation PCs. Unfortunately, malware and other destructive entities can just as easily target your servers, both on-premise or in the cloud, so many environments remain unprotected. Endpoint antivirus software is used to provide virus protection to endpoints, like servers, which connect to enterprise networks. Endpoint antivirus software...
Guide

2020 Malware Report

The Challenge of Malware: Finding Long Term Solutions for a Chronic Problem No matter how much technology progresses, malware continues to be a consistent menace that never seems to grow outdated. No matter how long the fight against malware has been, there is always more to learn in order to better safeguard against attacks. Finding out what other organizations are experiencing, and how they're...
Guide

Penetration Testing Toolkit

Safeguard your infrastructure and data With today’s constantly-shifting threat landscape, most organizations know they must employ offensive security measures like penetration testing to stay a step ahead of attackers. Based on our years of experience helping organizations manage security risks across the enterprise, we’ve compiled a collection of penetration testing tools and resources to set you...
Guide

Identity and Access Toolkit

Reduce identity related risk Implementing a strong identity governance and administration (IGA) program is crucial to any enterprise organization. Data is everywhere, but so are users. To protect your organization and reduce identity-related access risks, organizations must properly manage access to systems, applications, and devices. Based on our years of experience helping organizations manage...
Guide

Making the Case for Identity Governance

Building a Business Case for Identity Governance Solutions Organizations are facing increasing demands to protect the devices and systems critical to the business and are pressured to meet ongoing regulatory compliance. It's time to invest in intelligent identity governance solutions—but you need a solid business case to justify it. Download this step-by-step guide to learn how to: Define the...
Guide

Intelligent Identity and Access Management eBook

Leverage Intelligent IAM to help keep your organization’s identities and accounts secure Identity and Access Management (IAM) systems provide the capability to create and manage user accounts, roles, and access rights for individual users in an organization. They typically incorporate user provisioning, password management, policy management, access governance, and identity repositories in an...
Guide

Insider Threat Toolkit

How does your security stack up against insider threats? When thinking about cybersecurity, it's easy to focus on ways to block external threat actors attempting to breach your IT environment. But unfortunately, one of the biggest threats to your organization are your own employees. Many are accidental insiders susceptible to phishing attempts, while others may be malicious insiders attempting to...
Guide

Doing Identity Access Right

We’ve seen the same results year after year, stolen or misused credentials are, by far, the leading cause of data breaches. The reason for this is that access risk is extremely hard to manage on your own. From the most common access risks to proving compliance with government and industry regulations, you need a solution that can help you manage and minimize your risk. Control who has access to...
Guide

Identity & Access Governance Buyer's Guide

Comprehensive Identity and Access Governance (IAG) solutions provide value in many areas by: Improving the productivity of managers by simplifying identity and access certification processes Saving time for employees by speeding up the process to request and receive access to resources (especially when the request system is integrated with automated provisioning) Providing more data to speed up...
Guide

Doing Healthcare Identity Governance Right

Healthcare Organizations Face Extraordinary Challenges in a Dynamic, Complex Landscape During the last two decades, the healthcare industry has seen increasing regulations, an acceleration of technology, consolidation, and the pressure to increase operational efficiencies and decrease overall costs, while meeting growing patient demands. Addressing these issues, while staying focused on delivering...
Guide

7 Identity and Access Management Fears (And How to Overcome Them)

The growing scope and complexity of enterprise identities is becoming virtually impossible for organizations to securely and efficiently manage through traditional methods. Unfortunately, poor or underdeveloped Identity & Access Management (IAM) strategies leave the door wide open for devastating breaches. But Identity and Access Management (IAM) doesn't have to be scary. IAM solutions can also...
Guide

2019 Insider Threat Report

Insider attacks come in all shapes and sizes. Accidental insiders are susceptible to phishing attempts, while malicious insiders may expose or sell sensitive customer data. In order to learn more about how organizations are handling these attacks, Cybersecurity Insiders conducted a comprehensive survey of organizations and their security teams, exploring the evolution and ongoing challenges of...
Guide

2020 Pen Testing Survey Report

Pen testing is a security strategy in which ethical hackers assess an environment’s security posture by exploiting weaknesses, simulating what would happen if an organization was hit with a real-world attack. These tests provide organizations with invaluable information that can be a roadmap to remediation. The 2020 Pen Testing Report highlights results from a comprehensive survey of more than 800...
Blog

Securing Your Organization From the Inside Out

One of the most common ways for breaches to occur is purely out of not knowing if or how it could happen. You can’t protect what you don’t know you have – or that you don’t know you have to. Here are some tips for auditing your data and putting some security action behind it. Take Inventory of Your Data Before starting anything, are you aware of the data you’re collecting – or storing? Depending...