Automating the Discovery of NTLM Authentication Endpoints

Automating the Discovery of NTLM Authentication Endpoints

Recently, I have been working on adding support for automated enumeration and discovery of NTLM authentication endpoints to Chariot, our external attack surface and continuous automated red teaming product scanning pipeline. Our ...
IT cybersecurity defense attack alerts machine identity management insider threats security phishing Cybersecurity Threats on the Rise

Cybersecurity: How to do More for Less

Around the world, companies are experiencing a financial squeeze. In the U.S., inflation rose to 8.2% in September 2022, and the Federal Reserve raised interest rates to a range of 3% – ...
Security Boulevard
automation AI/ML access automation XSS Magecart zero trust

Human-Centric No-Code Automation is the Future of Cybersecurity

It’s never been more challenging to work in cybersecurity. The cost of a breach keeps going up, the number of attacks is constantly increasing and the industry is in the middle of ...
Security Boulevard
IoT Experts: What is Smart Manufacturing? (Part 1)

The Era of Smart Manufacturing: How 5G Can Power Industry 4.0

5G connectivity is set to power a whole new host of services. By 2025, it will account for 21% of the world’s mobile connections.  It also has the power to unlock the ...
Why No Code Solutions Are a Double-Edged Sword

Why No Code Solutions Are a Double-Edged Sword

| | AI, Automation, mdr, SOAR, SOC, threat detection
Most out-of-the-box security automation is based on a simple logic — essentially, if “this” happens, then do “that.” There is no actual coding required for this approach. While low code solutions are ...
GitLab security policy operational resilience SOC certificate DevSecOps: Beyond Manual Policy Implementation

Why the Security Policy is Dying

Security policies, a familiar tool of the CTO or CISO, are dying off, and I am glad to see them go. Long narrative descriptions of a top-down prescribed security policy ideal are ...
Security Boulevard
Top Seven Everyday IT Tasks You Should be Automating

Top Seven Everyday IT Tasks You Should be Automating

IT professionals have a tough but vital job. The rapid proliferation of different device types combined with the complexities ofRead More The post Top Seven Everyday IT Tasks You Should be Automating ...
Understanding MDR, XDR, EDR and TDR

Understanding MDR, XDR, EDR and TDR

A program with proper threat detection and response (TDR) has two key pillars: understanding the scope and being proactive in threat hunting. The biggest value of the security operations center (SOC) is ...
Intuition vs. Automation: What Man and Machine Bring to Data Security

Intuition vs. Automation: What Man and Machine Bring to Data Security

Cybersecurity experts Colin Henderson and Ray Espinoza share their take on the automation-driven power of machines versus the nuanced capabilities of humans in the security space. While automation is king in detection ...
Using AI/ML to Create Better Security Detections

Using AI/ML to Create Better Security Detections

The blue-team challenge Ask any person who has interacted with a security operations center (SOC) and they will tell you that noisy detections (false positives) are one of the biggest challenges. There ...