Syndicated Blog

Safe-T Blog
Read our blog about Secure Data Exchange, Secure Data Access and the world of email security in corporate settings.
Building Zero Trust With a Software Defined Perimeter

Building Zero Trust With a Software Defined Perimeter

Back in 2010, John Kindervag, the then-principal analyst at Forrester, coined the term Zero Trust. The idea behind this edgy-sounding concept was that when it comes to network security, nothing can be ...
US Ballistic Missile Agency Fails Security Audit

US Ballistic Missile Agency Fails Security Audit

We’ve spoken before about how difficult it is to secure important information at the level of individual US states. What about the U.S. military? ...
Red Team 201: Your First Test

Red Team 201: Your First Test

Over the last few weeks, Safe-T has provided a basic introduction to the tools and operating systems that you’ll use as a member or leader of a red team. Now, let’s contextualize ...
It's Time to Replace SMB with Something Smarter

It’s Time to Replace SMB with Something Smarter

Original network protocols are starting to age out of usefulness. HTTP is being replaced by HTTPS, people are trying to replace DNS with DNSSEC, and TLS just got its first update in ...
Creating A Secure Data Workflow With SDE

Creating A Secure Data Workflow With SDE

|
What does it look like when you secure a file with Safe-T? We talk a lot about creating granular access controls and integrating with your existing security structure, but it may just ...
What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?

What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?

For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and ...
Red Team 104: CrackMapExec

Red Team 104: CrackMapExec

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a ...
Red Team 103: Understanding Sqlmap

Red Team 103: Understanding Sqlmap

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a ...
Red Team 102: Understanding Metasploit

Red Team 102: Understanding Metasploit

|
Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a ...
Red Team 101: Understanding Kali Linux

Red Team 101: Understanding Kali Linux

Your security environment is complicated. You’re invested in multiple security tools – antivirus, firewalls, IDS, IPS, SIEM, DLP, and more. If you haven’t invested in a red team, however, you’re doing security ...
Loading...