Browsing Category
Features
10 posts
The State of Cyber Espionage in 2025—Part 2
In Part 2 of our series on Cyber Espionage, Elise Manna-Browne expands on techniques for recruiting a spy, and just how easy it can be to weaponize a human asset in 2025.
July 1, 2025 11:35 GMT
The State of Cyber Espionage in 2025—Part 1
It's mid 2025 and the modern cybersecurity landscape is starting to resemble the plot of a spy thriller—more activity is being attributed not just to remote nation-state actors, but human assets recruited to penetrate the office perimeter in-person with the goal of exfiltrating data.
July 1, 2025 11:34 GMT
The Modern IR Runbook
Incident Response (IR) is an ever-changing realm of cybersecurity that can leave teams scrambling at all hours, scouring runbooks to figure out the next steps during an attack. Automation can simplify much of this work, according to Abby Dykes, Threat Operations & Forensics Team Lead at Novacoast, who walked us through a few IR scenarios at the Nashville Innovate Summit in April.
June 18, 2025 16:30 GMT
The Dangerous Divide: Silos Between Security and IT Operations
The gap between security teams and IT operations has been a persistent issue in enterprises, and it’s only getting worse. These silos breed inefficiency, miscommunication, and ultimately create security vulnerabilities that organizations cannot afford.
March 11, 2025 15:28 GMT
A Practical Approach to Finding Secure SMB Partners
Matt Lee, Security and Compliance Senior Director at Pax8, opened his presentation at the 2024 Nashville Innovate event with an origin story that sets the stage for his career in cybersecurity—along with a few gems of advice.
October 29, 2024 14:02 GMT
Embracing the Dual Bastion Model: Transforming Access Control for Modern Security Challenges
The Dual Bastion Model offers a promising pathway toward enhancing access control for modern security challenges.
February 28, 2024 21:21 GMT
AppSec/DevOps: The Bigger Challenge for the Industry
Here we are taking a look at hardware complexity, the operating system layer, and then application complexity together…
December 21, 2023 10:38 GMT
Protecting Microsoft Teams From Data Exfiltration – A Tactical DLP Rule
The ubiquity of Microsoft Teams as a meeting tool makes it a ripe target for data breach. Novacoast's William Tooley guides us through a simple but effective tactical DLP rule to mitigate the risk of Teams data exfiltration from your organization.
September 12, 2023 15:08 GMT
The Art of ATT&CK
MITRE ATT&CK has been heralded as an excellent resource for known TTPs, but how does one actually utilize it in a cybersecurity strategy?
June 16, 2023 22:12 GMT
A More Secure Software Supply Chain
Mitigation of supply chain attacks begins with taking control of the software development lifecycle.
November 3, 2021 21:21 GMT