Why Insider Threat Denial is Everyone’s Problem

Why Insider Threat Denial is Everyone’s Problem

People don’t like to admit when they’re wrong. And really, who can blame them? Being wrong is uncomfortable, anxiety-inducing, and embarrassing. These are all feelings that people try their best to avoid. One of the most common methods for avoiding them is denial, or the unwillingness to accept something as ... Read More
Reducing Investigation Time: How to Quickly Parse True Positives

Reducing Investigation Time: How to Quickly Parse True Positives

In the world of security operations, quickly and accurately investigating security incidents is paramount. As a result, filtering out the non-consequential incidents from the consequential incidents helps reduce the investigative time for the security ops team. Non-malicious True Positives pose the most headaches for SOC teams because they waste valuable ... Read More
Empowering Employees to Reduce Security Incidents

Empowering Employees to Reduce Security Incidents

In the hustle and bustle of our modern world, we can all get easily lost in the noise. One kind of noise is most frustrating for security teams: the noise of security incidents. With more and more data feeds into your security analytics products, it seems like we are creating ... Read More
10 Things You Need to Know About Kerberos

10 Things You Need to Know About Kerberos

As our research team continues to find vulnerabilities in Microsoft that bypass all major NTLM protection mechanisms, we start to wonder about the successor protocol that replaced NTLM in Windows versions above Windows 2000. Enter Kerberos. Every child who grew up playing Dungeons and Dragons learned about the mythical creature ... Read More
Taming Network Chaos By Understanding User Behavior

Taming Network Chaos By Understanding User Behavior

Enterprises are badly burned by security tools that don’t work. When they finally see a solution that does what it purports to do, the shock is palpable ... Read More
What is Your Password?

6 Tips for Living a Healthy Digital Life and Avoiding Credential Theft This Holiday Season

| | Credential Compromise
Most of us still dream practical, down to earth, old fashioned dreams. And I’d place a bet that not many people, if any, dream about their credentials being stolen. Almost all of my memories from the last 15 years or so are stored digitally. The majority of my day to ... Read More
USENIX Enigma 2018 - LISA: A Practical Zero Trust Architecture

Zero Trust: Why Implementation Doesn’t Have to Mean Painful Surgery On Your Network – Pt. 2

|
Across the conference circuit and the general cybersecurity community this year, Zero Trust – a term originally coined in 2010 – has been perhaps the industry’s hottest buzzword. Move over, blockchain and machine learning. In my previous blog, I outlined what Zero Trust means and what lessons the framework offers ... Read More
John Kindervag of Forrester Research Discusses "Zero-Trust Architecture"

Hostile by definition: Thoughts on Zero Trust Security – and its pitfalls. Part 1

|
It’s a common question after a major breach: did you do everything you could have to protect your network? Most of the time the answer is...probably not. Often, we live in a false sense of security. We know it, and most of us are OK with it. But let's talk ... Read More
Seamless Threat Prevention for Cloud Assets - Preempt Secure Federated Access

Transitioning applications to the cloud doesn’t have to mean sacrificing security, visibility or control

|
A CISO recently told us that despite having an impressive array of cybersecurity solutions during their transition to the cloud, nothing was tying it all together from a threat standpoint. From her perspective, all the security tools at their disposal were great individually, but lacked visibility across all accounts and ... Read More
Shopping for a Cyber Security Product? 7 Tips to Help You Get What You Need.

Shopping for a Cyber Security Product? 7 Tips to Help You Get What You Need.

|
It’s increasingly difficult and more complex to be an effective buyer of security products today. Messaging and content overlaps are everywhere, cloud platforms claim to do what endpoint solutions do, and all the while products are constantly pivoting in the middle of operation - often changing their identity and main ... Read More