Penetration testing and other technical assessments are designed to be practical, useful exercises to examine your security defenses and look for holes in your network or applications. There’s real value …
Why Most Real-Time Defensive Solutions Are Poor Threat Hunting Solutions
When you enlist a hunt team to run compromise assessments, it’s important to determine which solutions and processes they’re using to actively hunt down threats. After all, compromise assessments (time-bound …
How to Test and Measure the Effectiveness of Your Security Awareness Program
In my previous blog, I wrote about security awareness programs and provided some high-level recommendations for how you can improve their effectiveness. In this article, I’d like to share some …
New White Paper Spotlights Methods to Avoid Cloud Misconfigurations
It’s easy to assume that cloud service providers are fully responsible for every aspect of cloud security. The truth is that configuration is an aspect of the shared responsibility model …