Noise Reduction and Prioritisation: One Size Does Not Fit All One man’s trash is another man’s treasure, what one considers undesirable is likely specific to the listener. Or, at least, that is the unwritten rule in several situations, one of … Read More
Technical leakage
How to Mitigate the Risks of Token Leaks
How to Mitigate the Risks of Token Leaks Access tokens are used in token-based authentication and allow users to access a website, an application or API. After verifying their identity, the user has no need to re-enter their credentials for … Read More
How Prepared Are CISOs for Cloud Security Risks?
How Prepared Are CISOs for Cloud Security Risks? Since the COVID-19 pandemic started, remote teams have increased reliance on cloud communication and team collaboration services. Although there was interest in cloud adoption far before the pandemic hit, industry research has … Read More
Why your team should be concerned about leaky buckets on the internet
Why your team should be concerned about leaky buckets on the internet Since its inception in March 2006, AWS cloud storage option, also referred to as S3 (Simple Storage Service), has generated keen interest due to its low maintenance and … Read More
All Is Fair In Darknet Wars
All Is Fair In Darknet Wars For anyone trying to collect data on the darknet, the last three years have been an incredible challenge. The dark net used to be a collection of simple marketplaces that could be easily indexed … Read More
Shodan: How We Evaluate Risk and Prioritize Alerts
Shodan: How We Evaluate Risk and Prioritize Alerts Monitoring open ports on Shodan can sound simple, but the reality is that there is a lot of data which regularly changes. Having yet another source that generates multiple alerts is not … Read More
Shodan: Where OSINT meets port scanning
Shodan: Where OSINT Meets Port Scanning Shodan is a well-known tool by both security experts and malicious actors. Launched in 2009, it gained popularity in 2013 following media coverage on CNN and Forbes. Where OSINT Meets Port Scanning Shodan is … Read More
Outsourcing Security to MSSP or MDR Services Could Bridge the Gap Between Talent and Budget
Outsourcing Security to MSSP or MDR Services Could Bridge the Gap Between Talent and Budget Is cybersecurity still going to be part of the conversation when the pandemic is over? If Covid-19 has taught us anything, it is to accept … Read More
The Ins and Outs of Illicit Chat Rooms
The Ins and Outs of Illicit Chat Rooms Over the past decade, the dark web has attracted much of the attention in the security field as the premier source of threats for companies. Our years of monitoring the dark web … Read More
Security Policies Do Matter, but Really Only So Much
Security Policies Do Matter, but Really Only So Much The SolarWinds incident has received extensive coverage over the past few months. For those that have missed the thousands of news stories published on this incident, it was best summarized by … Read More