Blog


Key Takeaways from Verizon's 2020 Data Breach Investigations Report (DBIR)

Key Takeaways from the 2020 Verizon Data Breach Investigations Report (DBIR) Linkedin Twitter Youtube Facebook Another year has brought us another Verizon DBIR. The Verizon 2020 Data Breach Investigations Report has loads of insightful commentary and telling statistics for its readers and shouldn’t be missed by anyone in the InfoSec community. However, this year’s DBIR sits at 119 total pages, and 119 pages is a lot to read and digest. Luckily for our readers, we have read the document and aim to provide a “key takeaways” resource to reinforce what you’ve read......

Continue Reading


Three Solutions to Common Red Teaming Problems

Three Solutions to Common Red Teaming Problems Red Teaming in cybersecurity has traditionally been very narrowly defined as those activities performed while replicating the templated actions of a likely adversary. These actions include a mixture of attempts to penetrate the network, application, and the human and physical defenses of the targeted organization. The problem with this narrow definition is that it focuses on methods, and not the true objective of the Red Team—which is to identify and stratify information security risks. If we take an objective-based approach rather than a method-based approach......

Continue Reading


How to Maximize Your Security on Zoom

How to Maximize Your Security on Zoom While 2020 has been a tumultuous year for many businesses across the globe, it has also provided opportunities for others to grow and expand their reach. One of the largest examples of this is seen with Zoom. Zoom has become a software juggernaut right before our eyes, growing exponentially in just a few month’s time. In fact, Zoom has grown its daily user count from a previous high of 10 million in December of 2019 to more than 200 million daily users in March of......

Continue Reading


MITRE ATT&CK® for Purple Teaming

MITRE ATT&CK® for Purple Teaming Malicious cyber actors are no different than any other business in at least one aspect – they are seeking to maximize their Return on Investment (ROI). If a technique works, there is no reason to re-invent the wheel for the next attack. This makes criminals efficient, but it also provides an opening for the defense. If attackers are using the same techniques to achieve their objectives, we can theoretically classify and map these techniques in order to systematically test our defenses. MITRE’s Adversarial Tactics, Techniques and Common......

Continue Reading


MITRE ATT&CK® Framework: Defined and Outlined

MITRE ATT&CK® Framework: Defined and Outlined According to the MITRE website, “MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.” Basically, this deep catalog of hackers’ tools of the trade is a fount of cybersecurity knowledge. The ATT&CK® framework can lay the foundation for offensive and defensive strategies in cybersecurity. The ATT&CK® Gold Standard Developed by MITRE, a non-profit think tank that manages federally funded research and development centers (FFRDCs), the open source ATT&CK® framework is becoming the gold standard for cybersecurity strategy. The acronym......

Continue Reading


Cybersecurity Trends in a COVID-19 Environment

Cybersecurity Trends in a COVID-19 Environment The sudden and devasting onset of the novel Coronavirus has left the whole world reeling and nearly every industry scrambling. Cybersecurity teams serving enterprises of every size have experienced significant changes to their landscape including protecting remote workforces, facing an onslaught of new threats, and managing tight budgets and dispersed teams. Protecting a Remote Workforce Many, many businesses experienced the mass and immediate departure of their workforces from their physical campuses. The security afforded from housing computers and other work devices on secure networks and physically......

Continue Reading


Keeping Your Focus in a Time of Insecurity

Keeping Your Focus in a Time of Insecurity Founder and CEO of PlexTrac, Inc., Dan DeCloss, shares his thoughts on the critical issues facing cybersecurity teams during the COVID-19 pandemic The sudden and unprecedented outbreak of COVID-19 has disrupted employees in nearly every industry and forced many enterprises to scramble to support a predominately remote workforce. Every organization’s cybersecurity measures will be tested like never before as the world continues to see cyber-attacks become as novel as the virus. Is your team ready for the challenges the global pandemic is presenting and......

Continue Reading


How to Maintain Cybersecurity When Working From Home

How to Maintain Cybersecurity When Working from Home With the COVID-19 pandemic sweeping across the globe, maintaining a secure environment while working remotely has never been more important. This pandemic has created many new opportunities for cyber-criminals to exploit unsecured technology systems. Hackers are taking advantage of the current work environment to exploit vulnerable attack vectors in order to reap a reward. Because of this threat, employers and employees alike need to dedicate extra time towards securing the technology all employees use, especially in the InfoSec field. Given the current working circumstances......

Continue Reading


Tips to Work Efficiently From Home

Tips to Work Efficiently From Home The global outbreak of the COVID-19 virus (also known as the Coronavirus) has changed the landscape of workplaces all over the globe. Some businesses have completely shut down physical work operations in the short-term; and while this might seem extreme, many businesses have adapted some form of a remote-style workplace. Remote work has been instituted mainly to practice “social distancing”, a term that in practice will limit the spread and severity of the virus. COVID-19 spreads when small droplets containing the virus are released, such as when......

Continue Reading


Challenges with the Cybersecurity Status Quo

Challenges with the Cybersecurity Status Quo Today, most mature organizations build their information security program around the “Red/ Blue” paradigm. Blue Teams self-assess to identify risk, implement continuous vulnerability management programs to mitigate risk, and (hopefully) detect and respond to incidents as they occur. Red Teams are often the “hired guns,” brought in to occasionally test the defenses and identify previously-unknown gaps. Larger organizations may have permanent in-house Red Teams, but they typically are spread thin and operate similarly to consultant services with regards to frequency of engagement with any given business......

Continue Reading