Endpoint Security

Keeping “IT” Security Real, Re-imagining Cyber Defenses

Much has changed due to Covid-19, Remote Work from Home (or Anywhere) and the ongoing SolarWinds fiasco have caused every cybersecurity team to review “what really matters in terms of cyber risk,” and master the basics as the foundation of their security program. As I have been known to say, in ‘cyber’ what was once true yesterday, may not be so today! It is often recommended to check-in from time-to-time and explore what may have changed. This continues to ring true today. When Covid-19 lockdowns were officially announced in March of 2020, much of the workforce had to rapidly shift to a new mode of working opening or compound existing …

Keeping “IT” Security Real, Re-imagining Cyber Defenses Read More »

Keeping IT Security Real Re-imagining Defenses


What is a ZERO DAY, REALLY? What is a zero-day, this can often confuse many as the term is used to describe zero-day exploits, zero-day attacks, zero-day malware and vulnerabilities. We’ve prepared this infographic to address any questions. The term “zero day” has come to describe one thing: A vulnerability or an attack vector that is known only to the attackers, so it can work without interruption from the defenders. You can think about it is a flaw in a piece of software, or even sometimes hardware. Typical Lifecycle, of a Zero Day Responsible Disclosure What is Not A Zero Day In-the-Wild, Zero Day Attacks Number of Zero Day by …

What is a ZERO DAY, REALLY? Read More »

What is a Zero-Day

Mitre Adds ICS-Specific Techniques To ATT&CK Framework

#MITRE has released a version of its ATT&CK knowledgebase covering tactics and techniques used in attacks against industrial control systems. MITRE’s ATT&CK, which stands for Adversarial Tactics, Techniques and Common Knowledge, is a framework widely used by cybersecurity professionals to check whether their defenses are enough to detect and block attacks. The first ATT&CK model was released in 2013 with a focus on Microsoft Windows. Since then, it has expanded to include Linux, Mac OS, and cloud platforms. The matrix of tactics and techniques describe how attackers break into and move within systems, from initial access and exfiltration. By breaking out different tactics into specific categories, defenders can detect and …

Mitre Adds ICS-Specific Techniques To ATT&CK Framework Read More »

Scroll to Top
error: Alert: Content selection is disabled!!