
A Primer on Threat Modeling
Threat modeling can be an overwhelming process to get started. There is a wealth of information out there on how to do it the “right way” and it can lead to decision paralysis. Here, we talk about a simple way to get started on your threat modeling journey to give you the necessary knowledge to choose your own “right way.”

CISA FY23 Risk and Vulnerability Assessments
Every year, the federal Cybersecurity and Infrastructure Agency (CISA) conducts Risk and Vulnerability Assessments (RVAs) for the executive branch, high priority critical infrastructure operators and select state/local stakeholders.
In September, CISA released a publication of the aggregate findings from their FY23 engagements. Within the findings, CISA mapped the most successful tactic in 11 of the 14 MITRE categories to help inform public and private companies of how to prioritize security controls in their environment.
In this blog, we will walk through findings from each tactic and provide real-world recommendations for how to mitigate risk in your organization.

CrowdStrike fal.con 2024
We were lucky enough to attend the CrowdStrike conference, Fal.con, this past week in Las Vegas. With CrowdStrike’s growing number of modules and products, there are too many updates to cover. However, in this blog we will try to distill some of the more notable takeaways and give our take on their impact to CrowdStrike customers.

Data Exfiltration Risks in Modern Enterprise
In today’s hyper-connected world, data has become the lifeblood of organizations, driving decision-making, innovation, and operational efficiency. However, with the increasing value of data, the risks associated with its loss or theft have also surged. Among the most significant threats to data security is data exfiltration, a scenario where sensitive or confidential data is illicitly transferred out of an organization. This blog will explore the nature of data exfiltration and the methods attackers use to bypass traditional security controls to transfer sensitive data out of your infrastructure.

Basic MFA is Not Protecting You from Phishing
In the ongoing battle against cyber threats, many organizations have turned to multi-factor authentication (MFA) as a silver bullet for securing their systems. However, basic MFA and phishing training are no longer sufficient, as modern phishing attacks have become increasingly sophisticated.