logo
January 27, 2023 | Joe Dibley

Covenant C2 Fills the Void Left by Empire PowerShell

Post-exploitation tools are used by threat actors to move laterally inside a network and escalate their privileges in order to steal data, unleash malware, create backdoors and more. Red teams and ethical hackers also use these tools; indeed, simulating the efforts of adversaries plays a key role...
December 16, 2022 | Joe Dibley

Covenant C2 Framework: The Complete Tutorial

Covenant is one of the latest and greatest command and control (C2) post-exploitation frameworks. This post will walk you through the process of configuring Covenant and using it to execute payloads on compromised hosts. Note: This post demonstrates the capabilities of Covenant as of...
January 18, 2022 | Mike Tierney

What Is Enterprise Information Security Architecture?

Spending on security and risk management is soaring worldwide. But exactly which improvements should you focus on next to best strengthen your cybersecurity program? For many organizations, building a solid information security architecture should be at the top of the list. Read on to learn how...
February 25, 2021 | Ilia Sotnikov

Security Policy: What It Is, Types and Key Components

When you hear the phrase “security policy,” a number of things may come to mind — cyberattacks, malware, data breaches and the like. While these are some reasons an organization might create security policies, a security policy for an organization covers protection of not only its digital...
April 30, 2019 | Farrah Gamboa

What is the Principle of Least Privilege?

One of the most basic things an organization can do to mitigate the risk of a security breach is implement the principle of least privilege (POLP). Read this blog to learn what POLP is and how you can use this principle to strengthen your security posture. The Principle of Least Privilege...
March 26, 2019 | Ryan Brooks

The CIA Triangle and Its Real-World Application

What is the CIA triad? Information security revolves around the three key principles:  confidentiality, integrity and availability (CIA). Depending upon the environment, application, context or use case, one of these principles might be more important than the others. For example, for a financial...
November 21, 2018 | Steve Dickson

What’s Lost in All the Buzz: 10 Cyber Essentials You Need before Machine Learning

IT security vendors often promote tempting cutting-edge technologies that claim to solve most of your cybersecurity issues. It is easy to get sucked in by buzzwords like UEBA (user and entity behavior analytics), AI (artificial intelligence), machine learning and advanced analytics, but a deeper...
June 28, 2018 | Matt Middleton-Leal

Four Tips for Building a Strong Security Culture in Your Organization

Today, nearly every organization relies on stable and secure IT operations, so cyber risks merit the same careful attention as other types of risks. Top leaders understand this: The World Economic Forum’s 2018 Global Risk Report claims that most influential movers and shakers view cyber attacks...
August 3, 2017 | Michael Ustinov

Top 4 IT Security Trends to Keep an Eye On

With attacks getting increasingly frequent and sophisticated, the traditional approach to shielding your IT ecosystem is no longer working. You can’t simply tie hands of “bad guys” and give full privileges to “good guys” because you can’t know which users you can actually trust. For...
November 17, 2016 | Russell Smith

Windows Information Protection: Your Private Security Helper

Windows Information Protection (WIP) provides organizations with a set of features to support a Mobile Device Management (MDM) system and enable separation of corporate and personal data to prevent leaks. In this article, I'll explain how WIP works. Why Use WIP? As corporate data becomes...
Show more articles
...