A Primer on Threat Modeling
Kevin Coddington Kevin Coddington

A Primer on Threat Modeling

Threat modeling can be an overwhelming process to get started. There is a wealth of information out there on how to do it the “right way” and it can lead to decision paralysis. Here, we talk about a simple way to get started on your threat modeling journey to give you the necessary knowledge to choose your own “right way.”

Read More
CISA FY23 Risk and Vulnerability Assessments
Matt Shafner Matt Shafner

CISA FY23 Risk and Vulnerability Assessments

Every year, the federal Cybersecurity and Infrastructure Agency (CISA) conducts Risk and Vulnerability Assessments (RVAs) for the executive branch, high priority critical infrastructure operators and select state/local stakeholders.

In September, CISA released a publication of the aggregate findings from their FY23 engagements. Within the findings, CISA mapped the most successful tactic in 11 of the 14 MITRE categories to help inform public and private companies of how to prioritize security controls in their environment.

In this blog, we will walk through findings from each tactic and provide real-world recommendations for how to mitigate risk in your organization.

Read More
CrowdStrike fal.con 2024
Matt Shafner Matt Shafner

CrowdStrike fal.con 2024

We were lucky enough to attend the CrowdStrike conference, Fal.con, this past week in Las Vegas. With CrowdStrike’s growing number of modules and products, there are too many updates to cover. However, in this blog we will try to distill some of the more notable takeaways and give our take on their impact to CrowdStrike customers.

Read More
Data Exfiltration Risks in Modern Enterprise
Matt Shafner Matt Shafner

Data Exfiltration Risks in Modern Enterprise

In today’s hyper-connected world, data has become the lifeblood of organizations, driving decision-making, innovation, and operational efficiency. However, with the increasing value of data, the risks associated with its loss or theft have also surged. Among the most significant threats to data security is data exfiltration, a scenario where sensitive or confidential data is illicitly transferred out of an organization. This blog will explore the nature of data exfiltration and the methods attackers use to bypass traditional security controls to transfer sensitive data out of your infrastructure.

Read More
Basic MFA is Not Protecting You from Phishing
Kevin Coddington Kevin Coddington

Basic MFA is Not Protecting You from Phishing

In the ongoing battle against cyber threats, many organizations have turned to multi-factor authentication (MFA) as a silver bullet for securing their systems. However, basic MFA and phishing training are no longer sufficient, as modern phishing attacks have become increasingly sophisticated.

Read More