Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

Why Nested Groups Don't Exist in the Cloud

Every Active Directory (AD) admin is familiar with nested groups. Rights are assigned to objects by virtue of their location in the tree; that’s just how things work. It’s convenient and makes entitlement management easier… until you consider its lack of maturity for identity governance. What once worked well now increases security risks and management overhead. Cloud directories have the benefit of shedding that type of technical debt.

Did you leave your front door open? Why cyberattacks surge using valid credentials

Have you ever been locked out of the house? Maybe you forgot your keys on the kitchen table, lost them running errands, or unknowingly dropped them while attempting the It doesn’t matter how you got locked out, or how you got back in. What’s more important, for the purposes of this thought exercise, at least, is how you responded.

AlgoSec and Zero-Trust for Healthcare

Before I became a Sale Engineer I started my career working in operations and I don’t remember the first time I heard the term zero trust but I all I knew is that it was very important and everyone was striving to get to that level of security. Today I’ll get into how AlgoSec can help achieve those goals, but first let’s have a quick recap on what zero trust is in the first place.

Add to Chrome? - Part 3: Findings and Recommendations

In the first two installments of this blog series, we explored some high-level concepts related to browser extensions and their security implications and then how we went about analyzing them. In this third blog we explore some of our findings and general recommendations on whether or not you should click “Add to Chrome” the next time you find a fancy new extension!

2024's Best GRC Platforms for Enterprises: An Expert Ranking

In today’s highly complex business landscape, enterprises are ever more aware of the need for robust governance, risk management, and compliance (GRC) capabilities. Hence the demand for effective GRC platforms has never been higher. These platforms not only assure that organizations stay on the right side of regulations. They also secure your business against a plethora of cyber threats and streamline governance processes.

Maximizing ROI with BDRSuite: A Cost-Effective Backup Solution

In the fast-paced world of modern business, the importance of robust backup and data protection solutions cannot be overstated. Organizations, regardless of their size or industry, are constantly on the lookout for cost-effective yet comprehensive solutions to safeguard their critical information. This is where BDRSuite by Vembu, a game-changer in the realm of backup and recovery, comes in. But what exactly sets BDRSuite apart from the competition?

Beginners' Guide for Microsoft Hyper-V: Shared Folders in Hyper-V - Part 64

Sharing resources between your Hyper-V host and a Hyper-V guest virtual machine may be needed for a number of use cases. Unlike a physical machine, you can’t just physically plug a removable drive into a Hyper-V virtual machine. However, Hyper-V has many modern capabilities allowing you to create shared resources between the Hyper-V host and guest virtual machines. Let’s look at shared folders in Hyper-V for beginners and see how this can be accomplished.

Inside the Mind of a Cybersecurity Threat Hunter Part 2: Identifying Persistence Techniques

In this second post of our threat hunting with Corelight and CrowdStrike blog series we dive into Persistence, which is one the many tactical categories outlined in the MITRE ATT&CK framework. In our previous blog, we reviewed some of the common techniques in the Initial Access category, like Drive-By Compromise and Spearphishing. In this post, we examine and provide some useful threat hunting tips on some of the common tactics attackers use to maintain long-term access to a target's environment.