Is Your Password Strong Enough? Brute Force Attack on the Rise!

Is Your Password Strong Enough? Brute Force Attack on the Rise!

In today’s technologically advanced world, our online accounts provide access to everything from personal information and funds to professional networks and interactions. Securing these accounts with strong passwords is critical. However, a ...
Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24

Cybersecurity Insights with Contrast CISO David Lindner | 2/23/24

Insight #1 The post quantum encryption era is upon us, and Apple is leading the charge to protect against future quantum computing attacks by boosting security on its iMessage platform, adding a ...
Blog-AmyLuby

3 Things to Ensure your start-up’s success

Execution is a fundamental component of success for any organization. Companies that struggle to execute effectively often face challenges and miss out on opportunities, and I would argue that execution.. The post ...
MITRE ATT&CK Technique-Driven Automation with Smart SOAR

MITRE ATT&CK Technique-Driven Automation with Smart SOAR

MITRE ATT&CK is invaluable for SOC teams in understanding adversary behaviors and actions across a range of networks. This robust framework offers granular insight into various attack tactics, techniques, procedures, and threat ...
Isolate: Network traffic filtering workflow using CrowdStrike, VirusTotal, and FortiGate NGFW.

Implementing MITRE D3FEND for ATT&CK Technique T1110: Brute Force

When account credentials are unknown, attackers may use a brute force attack in order to gain access. This can occur as an early stage of their attack, to gain initial access, or ...

How to Solve the Password Problem

An Overhaul in Password Security Passwords aren’t going anywhere. Despite the buzz that biometrics and MFA are holistic solutions, passwords are a ubiquitous, crucial layer for authentication—and they’re low-cost and simple, too.  That’s ...

The Exploitation of Privileged Accounts 

The flow of news about data breaches and ransomware attacks is relentless. Businesses of all sizes—large companies included—continue to suffer. Not only do cyber attacks lead to financial damage, but they have ...