Tag: Information security
January 27, 2023 |
Covenant C2 Fills the Void Left by Empire PowerShell
Post-exploitation tools are used by threat actors to move laterally inside a network and escalate their privileges in order to steal data, unleash malware, create backdoors and more. Red teams and ethical hackers also use these tools; indeed, simulating the efforts of adversaries plays a key role...
December 16, 2022 |
Covenant C2 Framework: The Complete Tutorial
Covenant is one of the latest and greatest command and control (C2) post-exploitation frameworks. This post will walk you through the process of configuring Covenant and using it to execute payloads on compromised hosts.
Note: This post demonstrates the capabilities of Covenant as of...
January 18, 2022 |
What Is Enterprise Information Security Architecture?
Spending on security and risk management is soaring worldwide. But exactly which improvements should you focus on next to best strengthen your cybersecurity program?
For many organizations, building a solid information security architecture should be at the top of the list. Read on to learn how...
February 25, 2021 |
Security Policy: What It Is, Types and Key Components
When you hear the phrase “security policy,” a number of things may come to mind — cyberattacks, malware, data breaches and the like. While these are some reasons an organization might create security policies, a security policy for an organization covers protection of not only its digital...
April 30, 2019 |
What is the Principle of Least Privilege?
One of the most basic things an organization can do to mitigate the risk of a security breach is implement the principle of least privilege (POLP). Read this blog to learn what POLP is and how you can use this principle to strengthen your security posture.
The Principle of Least Privilege...
March 26, 2019 |
The CIA Triangle and Its Real-World Application
What is the CIA triad?
Information security revolves around the three key principles: confidentiality, integrity and availability (CIA). Depending upon the environment, application, context or use case, one of these principles might be more important than the others. For example, for a financial...
November 21, 2018 |
What’s Lost in All the Buzz: 10 Cyber Essentials You Need before Machine Learning
IT security vendors often promote tempting cutting-edge technologies that claim to solve most of your cybersecurity issues. It is easy to get sucked in by buzzwords like UEBA (user and entity behavior analytics), AI (artificial intelligence), machine learning and advanced analytics, but a deeper...
June 28, 2018 |
Four Tips for Building a Strong Security Culture in Your Organization
Today, nearly every organization relies on stable and secure IT operations, so cyber risks merit the same careful attention as other types of risks. Top leaders understand this: The World Economic Forum’s 2018 Global Risk Report claims that most influential movers and shakers view cyber attacks...
August 3, 2017 |
Top 4 IT Security Trends to Keep an Eye On
With attacks getting increasingly frequent and sophisticated, the traditional approach to shielding your IT ecosystem is no longer working. You can’t simply tie hands of “bad guys” and give full privileges to “good guys” because you can’t know which users you can actually trust. For...
November 17, 2016 |
Windows Information Protection: Your Private Security Helper
Windows Information Protection (WIP) provides organizations with a set of features to support a Mobile Device Management (MDM) system and enable separation of corporate and personal data to prevent leaks. In this article, I'll explain how WIP works.
Why Use WIP?
As corporate data becomes...