url pub: https://lumu.io/blog/soc-of-the-future/ Lumu’s recently appointed Field CTO Jeffrey Wheat looks at the future of the SOC and how incremental improvement leads to proficient operations. Beginning...
Day: August 30, 2022
NTLMv1 vs NTLMv2: Digging into an NTLM Downgrade Attack
NTLMv1 vs NTLMv2: Digging into an NTLM Downgrade AttackOverview During the summer, my colleague Derya Yavuz and I published an article on some of the different...
BSidesTLV 2022 – Keren Elazari’s ‘Closing Remarks’
BSidesTLV 2022 – Keren Elazari’s ‘Closing Remarks’Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel. Permalink The post BSidesTLV 2022...
Establishing trust in your software supply chain with an SBOM
Establishing trust in your software supply chain with an SBOM A software Bill of Materials or SBOM provides transparency into an organization’s software, protecting it from...
Smart Cities Need to Keep Cybersecurity in Mind – Techstrong TV
Smart Cities Need to Keep Cybersecurity in Mind – Techstrong TV Karen, Senior Cybersecurity Strategist at VMware, and Charlene discuss smart city cybersecurity—why security is not...
3 Truths about the State of CRQ
3 Truths about the State of CRQI had an exciting time attending Blackhat 2022 in Last Vegas. Blackhat is great each year, but this year was...
Video: 5 P’s to Start Quantitative Risk Management – No 2 People
Video: 5 P’s to Start Quantitative Risk Management – No 2 People At RiskLens, we call our playbook for launching a cyber risk quantification (CRQ) program...
0ktapus/‘Scatter Swine’ Hacking Gang Stole 10,000 Corp Logins via Twilio
0ktapus/‘Scatter Swine’ Hacking Gang Stole 10,000 Corp Logins via Twilio More on the Twilio débâcle from earlier this month: Researchers reveal the hackers swiped at least 9,931...
An Introduction to API Protection
An Introduction to API ProtectionThe acceleration of digital transformation initiatives is fueling API growth. According to Gartner, by 2023, over 50% of B2B transactions will be...
Why Do You Need a WAF For Your Websites?
Why Do You Need a WAF For Your Websites?Businesses have to worry about different kinds of cyberattacks, many of which could bring down their websites, wipe...
Qualys Discovers Two Major Vulnerabilities – Techstrong TV
Qualys Discovers Two Major Vulnerabilities – Techstrong TV Bharat Jogi, Director of Security and Threat Research at Qualys, discusses the discovery of two recent vulnerabilities, the...
JavaScript bugs aplenty in Node.js ecosystem – found automatically
JavaScript bugs aplenty in Node.js ecosystem – found automaticallyHow to get the better of bugs in all the possible packages in your supply chain?Leer másNaked SecurityHow...