Five ways to lock down security control validation

Simple and important steps to make your cybersecurity program more efficient and effective. The post Five ways to lock down security control validation appeared first on AttackIQ ... Read More

What Security Teams Can Learn from the Attacks on Twitter and COVID-19 Researchers

| | Blog
Sometimes, I hate to be proven right. But on July 10, I contributed an article to Homeland Security Today questioning whether healthcare researchers and U.S. hospitals were adequately prepared to fend off a cyberattack. Then last week happened. Last Thursday, intelligence agencies in the U.S., U.K., and Canada released a joint statement ... Read More
Australian Cyber Security Centre (ACSC) Attacker Trends: Useful Information from the Government

Australian Cyber Security Centre (ACSC) Attacker Trends: Useful Information from the Government

| | Blog
In May, the Australian Cyber Security Centre (ACSC), Australia’s national-level cybersecurity authority, released the 2019-2020 cyber attacker tradecraft trends, an artifact which exposes the tactics, techniques and procedures noted as being used against Australian networks. This report is especially interesting for several reasons. First, it shows how Australia has embraced Mitre ATT&CK ... Read More