Stop Treating Your Data Center Like a Block Tower

Today, data centers are taking on new shapes and sizes and are existing in all-new locations, from traditional on-site operations to subsea locations with special cooling mechanisms. But one simple fact remains: Securing data centers is vital to any n… Continue reading Stop Treating Your Data Center Like a Block Tower

What happens if a sender changes the TCP window size over multiple packets that have the same ACK number?

I’m currently doing research on evasion attacks that seek to bypass a Deep-learning based Network Intrusion Detection System.
In order to achieve this, I need to know what the constraints are for the TCP window size field in the TCP packet… Continue reading What happens if a sender changes the TCP window size over multiple packets that have the same ACK number?

How to prevent azure pipelines (yaml) from being used as an attack vector?

Let’s say the following scenario exists:

A git repository exists on Azure DevOps Repos.
The repository uses yaml pipelines (azure-pipelines.yml).
The repository has branch policies to ensure that changes go through pull requests.
The bui… Continue reading How to prevent azure pipelines (yaml) from being used as an attack vector?

Auditing Cloud Administrator Behavior as a Matter of Data Breach Preparedness

New technologies often present interesting challenges for security teams, with cloud services such as AWS, Azure and GCP providing particularly novel cases in comparison to “classic” on-premise systems. As cloud services race to add new fea… Continue reading Auditing Cloud Administrator Behavior as a Matter of Data Breach Preparedness

What Security Leaders Should Consider When Building a Business Case for Integrity Monitoring

We all know there are a number of different security devices that need to be continually monitored because they represent attack vectors. That’s why understanding configuration management is critical to security hygiene. As practitioners, we need… Continue reading What Security Leaders Should Consider When Building a Business Case for Integrity Monitoring