by Tibor Luter | Jul 21, 2022 | blog
Find out why a vital component of vulnerability management needs to be the capacity to prioritize from Mariano Nunez, CEO of Onapsis and Threatpost Infosec Insiders columnist. Repeated warnings from CISA and the Biden Administration on the Russian cyber threat over...
by Tibor Luter | Dec 9, 2021 | blog
How can we prevent malware from communicating with a C&C server? You may think of using a CTI (Cyber Threat Intelligence) feed with a network blacklisting appliance. You may also think about blocking certain protocols or even using a Next-Generation Firewall to...
by Tibor Luter | Aug 26, 2021 | blog
Is Your Current Cybersecurity Strategy Right for a New Hybrid Workforce? The global pandemic forced many employees to work from home, and remote working is likely to become a firmly established part of the working routine for employers and employees when it ends. A...
by Tibor Luter | Aug 9, 2021 | blog
Building a Huntbook to Discover Persistent Threats from Scheduled Windows Tasks In this blog post, the first in a series introducing the Kestrel Threat Hunting Language, we will show you how to get started with your first hunt. You’ll learn how to set up your...
by Tibor Luter | Aug 5, 2021 | blog
The discovery stage of your cloud migration project Migration or digital transformation to the Cloud is at the forefront of every organisation’s plans- It’s no longer a case of if that transformation is happening it’s how Some organisations are not sure where to start...
Recent Comments