supply chain, SBOM, cybersecurity, SLSA organizations third party attacks supply chain supply chain ransomware The Kill Chain Model

The Kill Chain Model Works When Analysts See the Full Picture

Just about every cybersecurity professional is familiar with the cyber kill chain, a set of steps bad actors typically go through with the end goal of stealing valuable data. Reconnaissance. Weaponization. Delivery. Exploitation. Installation. Command and Control. Actions on Objective. Sound familiar? The goal of cyberteams is to detect bad ... Read More
Security Boulevard
developers

Data Loss Prevention Needs a Little Help from Its Friends

I recently read an article on Security Boulevard discussing how to get the most out of data loss prevention (DLP) technology. While much of the byline I agree with, especially the three questions all organizations should be asking to understand their data (What’s sensitive to us? Where does sensitive information ... Read More