Swimlane research team open sources pyattack

NOTE: The Mitre ATT&CK Framework is NOT an all-encompassing/defacto security coverage map. It is rather a FRAMEWORK, and other avenues should be considered when assessing your security posture. As security teams adopt the Mitre ATT&CK Framework to help them identify gaps in their defenses, having a way to identify what ... Read More
Swimlane open-sources graphish to help SecOps Teams

Swimlane open-sources graphish to help SecOps Teams

| | secops
While having a conversation on Twitter about Microsoft Graph API I was convinced that the traditional Exchange eDiscovery features were not available in the Microsoft Graph API. Boy was I wrong. After stumbling across a few endpoints I had not seen previously, I decided to write a python package called ... Read More
Swimlane open-sources graphish to search and delete messages using Microsoft Graph API

Swimlane open-sources graphish to search and delete messages using Microsoft Graph API

While having a conversation on Twitter about Microsoft Graph API I was convinced that the traditional Exchange eDiscovery features were not available in the Microsoft Graph API. Boy was I wrong. After stumbling across a few endpoints I had not seen previously, I decided to write a python package called ... Read More
Swimlane open-sources graphish help SecOps Teams

Swimlane open-sources graphish help SecOps Teams

While having a conversation on Twitter about Microsoft Graph API I was convinced that the traditional Exchange eDiscovery features were not available in the Microsoft Graph API. Boy was I wrong. After stumbling across a few endpoints I had not seen previously, I decided to write a python package called ... Read More
Swimlane open-sources graphish to help SecOps Teams

Swimlane open-sources graphish to help SecOps Teams

| | secops
While having a conversation on Twitter about Microsoft Graph API I was convinced that the traditional Exchange eDiscovery features were not available in the Microsoft Graph API. Boy was I wrong. After stumbling across a few endpoints I had not seen previously, I decided to write a python package called ... Read More

Hey InfoSec, what are you doing to protect your developers?

DevOps, serverless applications and containers are just a few of the latest advancements in a developer's toolbox. For development teams, this means that the time to market (TTM) is faster—especially for Agile teams. So, how and what are security operations teams doing to ensure that security is keeping pace with ... Read More

Hey InfoSec, what are you doing to protect your DevOps Team?

| | secops
DevOps, serverless applications and containers are just a few of the latest advancements in a developer's toolbox. For development teams, this means that the time to market (TTM) is faster—especially for Agile teams. So, how and what are security operations teams doing to ensure that security is keeping pace with ... Read More

Swimlane research team open sources py-ews

| | secops, Use Cases
Phishing impacts every organization, and security operations (SecOps) teams need to act quickly to remediate and prevent unknown threats within their email infrastructure. To help combat these threats, the Swimlane research team has open sourced py-ews to enable security and IT teams to interact with Microsoft Exchange Web Services (EWS) ... Read More

Swimlane research team open sources py-ews

| | secops, Use Cases
Phishing impacts every organization, and security operations (SecOps) teams need to act quickly to remediate and prevent unknown threats within their email infrastructure. To help combat these threats, the Swimlane research team has open sourced py-ews to enable security and IT teams to interact with Microsoft Exchange Web Services (EWS) ... Read More
Automate employee off-boarding processes with Swimlane

Automate employee off-boarding processes with Swimlane

| | Use Cases
As more organizations discontinue internal services and begin adopting an increasing number of third-party *aaS-based services, ensuring the appropriate access is revoked in a timely manner is critical. By using our new employee off-boarding use case, you can automatically gather historical data, add a user to a monitoring watch list, ... Read More