Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LimaCharlie & Velociraptor Enable the Automation of Deep Forensic Capability

Digital forensics is about answering questions and building timelines. Who did what and when. When something malicious takes place on a computer there is evidence that can be collected and used to reconstruct what exactly happened. Depending on the type of events that need to be reconstructed, the evidence required may be difficult to retrieve. In order to make the lives of DFIR professionals easier, LimaCharlie has integrated the Velociraptor open source endpoint visibility tool.

The University of New Orleans: Protecting The Future

Universities are becoming a primary target for ransomware. In 2020 alone, 26 major universities were hit locking valuable research and requiring an average payout of over $450,000. The loss of this type of research and data is colossal. How is the University of New Orleans protecting the future of tomorrow and mitigating threats?

Riscosity - Securing The Digital Supply Chain - Thought Leaders - Ep. 1

In this episode of Securing the Digital Supply Chain Anirban Banerjee , CEO and co-founder of Riscosity talks to Atif Yusuf and Ravi Gunturi, two well known security leaders in the San Francisco Bay Area. Note - all opinions expressed here belong to the individuals only.

Nuvias UC Fuels Its Growth In Europe Through Alliance Technologies GmbH Acquisition

As part of its exciting and fast-paced growth, driven by increased demand from its customer base to provide best of breed solutions across Europe, Nuvias UC announces the acquisition of Alliance Technologies GmbH, a UC specialised, value added distributor founded in 2001.

Multi-Factor is incomplete without backup codes

I was logging into one of my favorite online shopping sites the other day, and, as with all my other sites, I was presented with the multi-factor authentication prompt to complete the login process. Anyone who knows me, knows that I have been a long-time supporter of multi-factor, or 2-step verification of any kind.

URL confusion vulnerabilities in the wild: Exploring parser inconsistencies

URLs have forever changed the way we interact with computers. Conceptualized in 1992 and defined in 1994, the Uniform Resource Locator (URL) continues to be a critical component of the internet, allowing people to navigate the web via descriptive, human-understandable addresses. But with the need for human readability came the need for breaking them into machine-usable components; this is handled with URL parsers.

Hello CISO - Episode 1 (Part 2): The Downfall of On-Premise Security

In the beginning, there was on-premise. Then things got complicated. Hello CISO is a new series aimed at Chief Information Security Officers, IT security teams, and all other members of an organization responsible for maintaining the safety and integrity of the business and its operations. "The responsibilities of the modern CISO are expanding as digital infrastructure grows more complex. It’s no longer feasible to protect against every single threat, so you have to think more strategically. We need to work smarter, not harder – and that’s what I want to explore in this series."