Raspberry Pi sensors for home networks

Who’s your fridge talking to at night?

By Gary Fisk, Sales Engineer, Corelight I love origin stories – the tales of grand plans, unforeseen circumstances, and necessity that creates something new. These strange times have resulted in something new ...
Total Cost of Ownership: Why It’s Important for Businesses

Total Cost of Ownership: Why It’s Important for Businesses

A total cost of ownership (TCO) analysis is vital to examine the financial impact of implementing new technologies in business. In information technology, assessing the TCO provides a broader view of the ...
Enterprise VPNs Need Securing as Attackers Capitalize on WFH Trend

Enterprise VPNs Need Securing as Attackers Capitalize on WFH Trend

| | Industry
Attacks against enterprise VPNs have become some of the most common and critical threats facing enterprises today. As employees shift to working from home and become dependent on VPN access all day, ...
Google Drive's updated retention policy depicted as the Google Drive Trash icon next to a 30-day countdown clock.

Google Drive Trash Retention Reduced by 10,000 Years

| | G Suite, Industry
As of October 13, 2020, all files placed in Google Drive trash will be permanently deleted after 30 days. Previously, these files would be retained indefinitely unless manually deleted by the user ...
Detect and Mitigate Critical Intel Vulnerabilities (INTEL-SA-00241, INTEL-SA-00404)

Detect and Mitigate Critical Intel Vulnerabilities (INTEL-SA-00241, INTEL-SA-00404)

| | Industry
Enterprise devices include a variety of components that are critical to the security posture of the device. Components used for out-of-band management and Trusted Platform Modules (TPM) used to protect cryptographic keys ...

Turning our Vision into Reality

| | Industry
I wanted to share exciting news from Eclypsium. Last week we announced that we raised new capital from notable new investors and existing investors that have continued to support us over our ...

The Subjective Nature of a CVSS Score

| | Industry
A CISO’s Perspective During a recent internal threat modeling exercise, a member of the Eclypsium team discovered that a vendor had mis-scored a few related vulnerabilities across a consumer/enterprise grade product line ...
DEF CON Safe Mode - Mickey Shkatov and Jesse Michael - Bytes In Disguise

Applying Lessons From CISA to Your Firmware

| | Industry
Download the PDF > The Cybersecurity and Infrastructure Security Agency (CISA) recently published alert AA20-245A, Technical Approaches to Uncovering and Remediating Malicious Activity. The alert serves as a playbook for security incident ...
Ready Player One: What Firmware Gaming Cheats Mean for Enterprise Security

Ready Player One: What Firmware Gaming Cheats Mean for Enterprise Security

| | Industry
The worlds of gaming and hacking have always shared interesting areas of overlap. For many of us, games were the initial lure that sparked the interest into how computers and applications worked, ...
Mitigating Risk From APT41 Attacks Against Networking and Enterprise Infrastructure

Mitigating Risk From APT41 Attacks Against Networking and Enterprise Infrastructure

| | Industry
Earlier this year, researchers at FireEye disclosed a series of attack campaigns attributed to the Chinese hacking group known as APT41. These attacks were notable both for their scale as well as ...