If you work on a corporate security team, endpoint security is an important framework to understand. After reading this blog, you’ll know the ins and outs of this framework, including why it’s crucial to modern networks and the best practices to implement and maintain it.
Read moreCategory: Network Security
Building a geo attack map with the Scrutinizer API: part 2
So far we have used the Scrutinizer API to build a dataset that tells us how many hits our top ten countries are getting. Next, we’ll explore how easy it is to use this data to populate an open source digital heat/attack map.
Read moreSecurity orchestration advantages with Plixer
If this ever changin’ world
in which we live in
makes you give in and cry
say I’m only one guy
Building a geo attack map with the Scrutinizer API
Every once in a while I get the opportunity to sit down and work on things that are outside of the box when it comes to Scrutinizer. Well, this month was the perfect one for that. For a long time, I’ve wanted to create a geolocation-based heatmap of countries that are being visited on the network. Honestly, I have always had a fondness for heatmaps and attack maps, specifically geo-heatmaps. With that in mind, I decided to build a script that outputs countries and their hits. I’ll then take that data and populate an open source digital heat/attack map.
Read moreHow can data theft be prevented?
Corporate data theft is nothing new. In fact, according to a study conducted by McAfee, “[a] majority of IT professionals have experienced at least one data breach during their careers—61% at their current company and 48% at a previous company.” This is an alarming reality, but it’s one that we can understand better to prevent future data breaches.
Read moreThis is how I found out FaceApp was stealing my data
FaceApp is another selfie service that allows you to share aging and other filtered photos with your friends. It has been downloaded by millions of users since its introduction in January 2017 and seems harmless enough. But like with any new social media application, I was suspicious and rightfully so.
Read morePhishing detection: what not to do and how we help
Phishing attempts have been showing up a lot in the news lately and scammers are getting smarter. What can we do? What shouldn’t we do?
Read moreQ2 roundup: 13 interesting articles on cybersecurity news & expert opinions
Things move fast in cybersecurity, and it’s always worth investing time to stay up-to-date on the state of the field. Once again, I’ve gathered 13 articles all about cybersecurity news and insights to provide some food for thought.
Read moreThe Black Hat 2017 Chronicles: Day 6. Lessons Learned
It has been my privilege to spend a week at Black Hat USA 2017 and keep you all up to date on the NOC and conference news. With Gigamon and Scrutinizer combined, the NOC team was able to baseline and detect unwanted behaviors. I was also fortunate to analyze flow data with the Palo Alto next-generation firewall that allowed us to identify the applications generating excessive traffic on the network. As I am about to pack my bags and say goodbye to the Entertainment Capital of the World, I would like to take a few minutes to go over the lessons we learned from one of the biggest information security communities.
The Black Hat 2017 Chronicles: Day 5. Researching IoT Physical Attack Exploits
The Internet of Things (IoT) is placing an unprecedented number of unsecured devices on the internet every day. We all heard about IoT devices used to launch Denial of Service Attacks (DDoS) and toys violating your children’s data privacy. Can an IoT device be exploited to physically attack an unsuspecting user? “Yes, it can,” says security researcher Billy Rios, who shows the Black Hat 2017 attendees how.