The State of Cyber Espionage in 2025—Part 2
In Part 2 of our series on Cyber Espionage, Elise Manna-Browne expands on techniques for…
The State of Cyber Espionage in 2025—Part 1
It's mid 2025 and the modern cybersecurity landscape is starting to resemble the plot of a…
The Modern IR Runbook
Incident Response (IR) is an ever-changing realm of cybersecurity that can leave teams…
The Dangerous Divide: Silos Between Security and IT Operations
The gap between security teams and IT operations has been a persistent issue in enterprises,…
A Practical Approach to Finding Secure SMB Partners
Matt Lee, Security and Compliance Senior Director at Pax8, opened his presentation at the…
Embracing the Dual Bastion Model: Transforming Access Control for Modern Security Challenges
The Dual Bastion Model offers a promising pathway toward enhancing access control for modern…
AppSec/DevOps: The Bigger Challenge for the Industry
Here we are taking a look at hardware complexity, the operating system layer, and then…
Protecting Microsoft Teams From Data Exfiltration – A Tactical DLP Rule
The ubiquity of Microsoft Teams as a meeting tool makes it a ripe target for data breach.…
The Art of ATT&CK
MITRE ATT&CK has been heralded as an excellent resource for known TTPs, but how does one…
A More Secure Software Supply Chain
Mitigation of supply chain attacks begins with taking control of the software development lifecycle.