Dissect: Open-source framework for collecting, analyzing forensic data

A game changer in cyber incident response, the Dissect framework enables data acquisition on thousands of systems within hours, regardless of the nature and size of the IT environment to be investigated after an attack. Dissect framework development Fo… Continue reading Dissect: Open-source framework for collecting, analyzing forensic data

How Just-in-Time privilege elevation prevents data breaches and lateral movement

Are inadequate security policies for privileged access making you highly vulnerable to security breaches and ransomware attacks? In the weeks that followed the high-profile attack on the SolarWinds supply chain, it became clear that the threat actors i… Continue reading How Just-in-Time privilege elevation prevents data breaches and lateral movement

Zero-trust-washing: Why zero trust architecture is the framework to follow

Have we got to the point where the term “zero trust” is being misused or misrepresented by some vendors as they look to capitalize on its momentum in the market? It is a tricky one for vendors, as it isn’t possible to label any single product or servic… Continue reading Zero-trust-washing: Why zero trust architecture is the framework to follow

Modular Laptop Maker Provides Mainboard Documentation for Non-Laptop Projects

If you’ve been following the latest advancements in computing for a while, you already know that there’s a big problem with laptops: When they’re no longer useful as a daily …read more Continue reading Modular Laptop Maker Provides Mainboard Documentation for Non-Laptop Projects

How to protect air-gapped networks from malicious frameworks

ESET researchers present their analysis of all malicious frameworks used to attack air-gapped networks known to date. An air-gapped network is one that is physically isolated from any other network in order to increase its security. This technique can … Continue reading How to protect air-gapped networks from malicious frameworks

MITRE D3FEND: Enabling cybersecurity pros to tailor defenses against specific cyber threats

D3FEND, a framework for cybersecurity professionals to tailor defenses against specific cyber threats is now available through MITRE. NSA funded MITRE’s research for D3FEND to improve the cybersecurity of National Security Systems, the Department of De… Continue reading MITRE D3FEND: Enabling cybersecurity pros to tailor defenses against specific cyber threats