What is a Blue Teamer, and How Can They Protect Your Data?

Modern-day cybersecurity isn’t just about preventing and responding to threats; it’s about setting up defenses that can detect and respond to suspicious activity before it can do any damage. But to adequately protect an organization’s systems, a team of cybersecurity professionals needs to work together to put their security protocols to the test. To do […]

The post What is a Blue Teamer, and How Can They Protect Your Data? appeared first on Security Intelligence.

Continue reading What is a Blue Teamer, and How Can They Protect Your Data?

Listen up 4 – CYBERSECURITY FIRST! Purple teaming – learning to think like your adversaries

Michelle Farenci knows her stuff, because she’s a cybersecurity practitioner inside a cybersecurity company! Learn why thinking like an attacker makes you a better defender. Continue reading Listen up 4 – CYBERSECURITY FIRST! Purple teaming – learning to think like your adversaries

When Is an Attack not an Attack? The Story of Red Team Versus Blue Team

Cybersecurity experts fill our days with terminology from warfare, including jargon such as red team versus blue team. The concept of ‘red team’ has its origin in wargaming. The red team plays an opposing force and attempts to bypass the barriers of the defending or blue team.   These exercises are not about winning or […]

The post When Is an Attack not an Attack? The Story of Red Team Versus Blue Team appeared first on Security Intelligence.

Continue reading When Is an Attack not an Attack? The Story of Red Team Versus Blue Team

How purple team operations helped defend the Pentagon — and can help your security team today.

The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations.
The post How purple team operations helped defend the Pentagon — and can help your security team today. appea… Continue reading How purple team operations helped defend the Pentagon — and can help your security team today.

How Cloud Defenders Thwart Attacks Against Resilient Services

The introduction of containers and micro-service architectures have changed the way we develop, deploy, and run our applications.  Not only has this changed application development, but it’s also created some visibility challenges for application secu… Continue reading How Cloud Defenders Thwart Attacks Against Resilient Services

Reading the Application Security Tea Leaves – How to Interpret the Analyst Reports

There are a number of industry analyst reports on application security.  Each analyst firm and report takes its own slice of the market to analyze and report on vendors within that market.  For example, the Forrester Wave focuses on Static Application… Continue reading Reading the Application Security Tea Leaves – How to Interpret the Analyst Reports

How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack

The post How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack appeared first on Security Weekly. Continue reading How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack