Red Team 201: Your First Test

Red Team 201: Your First Test

Over the last few weeks, Safe-T has provided a basic introduction to the tools and operating systems that you’ll use as a member or leader of a red team. Now, let’s contextualize them – how would you use these tools in the context of an actual security exercise? ... Read More
Creating A Secure Data Workflow With SDE

Creating A Secure Data Workflow With SDE

|
What does it look like when you secure a file with Safe-T? We talk a lot about creating granular access controls and integrating with your existing security structure, but it may just be easier to put the whole journey in context. Starting with an email and an attachment, here's how ... Read More
Red Team 103: Understanding Sqlmap

Red Team 103: Understanding Sqlmap

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing ... Read More
Want to Make $100 Million from Hacking? Steal Press Releases

Want to Make $100 Million from Hacking? Steal Press Releases

Stealing credit card number? Old hat. Ransoming information? Been there, done that. Apparently, if you want to make real money from hacking (not that we’re suggesting this), press releases are the latest and most lucrative piece of valuable information ... Read More
Why DNSSEC Isn't Enough

Why DNSSEC Isn’t Enough

|
When you type a URL into the top of your browser and hit “enter,” a number of complicated things begin to happen. Somehow, the alphanumeric English language of a URL gets translated into the machine language of an IP address, allowing your browser to resolve a new webpage ... Read More
Anonymous Application Access: Get This Valuable Service Safely On Board

Anonymous Application Access: Get This Valuable Service Safely On Board

In an age where the cloud has made browser interactions the norm, companies are discovering the value of anonymous application access and client-less access ... Read More
Are You Securing Cloud Storage Wrong?

Are You Securing Cloud Storage Wrong?

No cloud implementation – in any business unit at any company – is perfect. That’s a given. IT administrators, directors, and CIOs have always been forced to make compromises between convenience, cost, and security ... Read More
More Vendors Mean More Cyberattacks – Protect Your Supply Chain!

More Vendors Mean More Cyberattacks – Protect Your Supply Chain!

| | cyberattack
The rise of "as a Service" companies mean that the corporate supply chain is more complicated than ever. Your company probably doesn't do its own hiring, accounting, or software development in-house ... Read More
Industrial Security: Is the Air Gap Still Viable?

Industrial Security: Is the Air Gap Still Viable?

| | IIoT, Industrial Security
In theory, the digital aspect of industrial control systems is supposed to be air-gapped from run of the mill corporate networks. In practice, however, there will often be bridges – left either accidentally or on purpose – between industrial controls and the general-purpose internet ... Read More