Featured Blogs
XDR – Please Explain?
SIEM, we need to talk! Albert Einstein once said, “We cannot solve our problems with the same thinking we used when we created them”. Security vendors have spent the last two decades providing more of the same orchestration, detection, and response capabilities, while promising different results. And as the old adage goes, doing the same thing ...
Why it’s Best to Stick to Sharing Chocolates and Flowers this Valentine’s Day
Valentine’s Day is nearly upon us – and as couples and singletons alike gear up for a day that’s traditionally all about sharing, when it comes to our digital identities, might we be sharing too much, and how can we protect ourselves? With data showing that past, present and possibly ...
Researchers Follow the Breadcrumbs: The Latest Vulnerabilities in Windows’ Network Stack
The concept of a trail of breadcrumbs in the offensive security community is nothing new; for many years, researchers on both sides of the ethical spectrum have followed the compass based on industry-wide security findings, often leading to groundbreaking discoveries in both legacy and modern codebases alike. This happened in ...
Europe’s Quantum Story is Accelerating, and the World Will be Better for it
Quantum computing is the next frontier in computer science. It can bring untold benefits, allowing the development of new materials, tackling pandemics and making the world a greener, safer place. But it also threatens to break the encryption that keeps our data safe from prying eyes. France’s recent announcement to ...
Lets Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Safer Online
It’s Time to Have “The Talk” About the Internet: 7 Conversation-Starters for Staying Much Safer Online With Safer Internet Day upon us, it’s time to have “The Talk.” The internet talk, that is. What’s the internet talk? It’s a candid conversation about how safe we’re really being when we go ...
6 Best Practices for SecOps in the Wake of the Sunburst Threat Campaign
1. Attackers have a plan, with clear objectives and outcomes in mind. Do you have one? Clearly this was a motivated and patient adversary. They spent many months in the planning and execution of an attack that was not incredibly sophisticated in its tactics, but rather used multiple semi-novel attack ...
Affected by a Data Breach? Here Are Security Steps You Should Take
Affected by a Data Breach? Here Are Security Steps You Should Take We share personal information with companies for multiple reasons: to pay for takeout at our favorite restaurant, to check into a hotel, or to collect rewards at the local coffee shop. While using a credit card is convenient, ...
SOCwise Series: Practical Considerations on SUNBURST
This blog is part of our SOCwise series where we’ll be digging into all things related to SecOps from a practitioner’s point of view, helping us enable defenders to both build context and confidence in what they do. Although there’s been a lot of chatter about supply chain attacks, we’re going to ...
Apoio às mulheres mais atingidas pela pandemia
Apoio às mulheres mais atingidas pela pandemia Apenas 57% das mulheres nos Estados Unidos estão a trabalhar ou à procura de trabalho neste momento – a taxa mais baixa desde 1988. Esses dados reveladores são apenas um dos muitos que ilustram um forte contraste nestes tempos difíceis: dos milhões que ...
Proporcionando apoio às mulheres mais atingidas pela pandemia
Proporcionando apoio às mulheres mais atingidas pela pandemia Nos EUA, apenas 57% das mulheres estão trabalhando ou procurando trabalho no momento. O índice mais baixo desde 1988. Esses dados reveladores mostram apenas um dos vários índices que ilustram um forte contraste nestes tempos difíceis: das milhões de pessoas que viram ...