Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The perfect storm: How digital transformation is reshaping security and networking

Think back to the end of 2019. Enterprises were evolving IT infrastructure at a moderate pace to reduce costs, be more competitive, and improve their ability to adapt to an increasingly digitized world. Whether migrating workloads to the cloud, virtualizing network functions, diversifying mobility, or moving applications and services closer to the edge, digital transformation was steadily evolving the business landscape.

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments. Dubbed DCShadow, this is a late-stage kill chain attack that allows a threat actor with admin (domain or enterprise admin) credentials to leverage the replication mechanism in AD to register a rogue domain controller in order to inject backdoor changes to an AD domain.

How will comply-to-connect (C2C) help you with compliance assessment?

“Trust but verify” is a common phrase in the DoD, usually referring to managing people or tasks. In order to build trusted network environments, cyber administrators need to know that their security and management tools are working properly, and that connecting endpoints and users are compliant with security policies. So how will C2C capabilities help you with compliance assessments?

How will comply-to-connect (C2C) help you gain control?

Zero Trust, Access Control, Least-Privileged Access -- call it what you want, trust within a network is an opportunity for Administrators to excel … or get fired. Administrators must continually balance user access to mission data and services with security measures to protect those functions, and policy-based automation is the only way to keep up. So how will C2C capabilities help you gain control?

How will comply-to-connect (C2C) provide automated orchestration of your tools?

“Silos of excellence” can create havoc between security teams and can also adversely impact to your user’s experience, or even their connectivity. Keeping all your tools in synch can be a daunting manual mistake-laden challenge. So how will C2C capabilities provide automatic orchestration of your tools?

Outpost24 webinar - Preventing wireless attacks with device visibility and effective controls

In 2020 we’ve seen a growing number of security professionals become more aware of wireless threats and the majority lack confidence in how to prevent them impacting their business. Join our webinar as we discover the key trends in wireless security from our recent RSA 2020 survey and Internet of Evil Things report. Our wireless expert will explore the different challenges we face in securing our network airspaces and combatting the most common threats by creating more effective classification of risk assessment through automation.

Outpost24 Webinar: Common Wireless Security Threats and How to Avoid them

The #1 challenge for busy security professionals is how can you secure what you don’t know about? 100% of companies has reported finding rogue consumer devices lurking on their enterprise network, highlighting the risk of airborne attacks. Join our webinar to learn how best to discover full scope of what you own and spot anomalies before rogue devices turn malicious.

Full VPC traffic visibility with AWS Network Firewall and Sumo Logic

We’re happy to partner with AWS on their launch of AWS Network Firewall by providing a cloud-native integration that gives customers real-time visibility into network traffic and automated correlated events surfaced by AWS. Too often, virtual private cloud (VPC) traffic is a black box leaving many security operations teams unable to connect potential threats to their broader infrastructure.

Common Nginx misconfigurations that leave your web server open to attack

Nginx is the web server powering one-third of all websites in the world. Detectify Crowdsource has detected some common Nginx misconfigurations that, if left unchecked, leave your web site vulnerable to attack. Here’s how to find some of the most common misconfigurations before an attacker exploits them. Nginx is one of the most commonly used web servers on the Internet due to it being lightweight, modular, and having a user-friendly configuration format.