Did you just create a paradise for hackers? – Part 2

Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This is the second post of the series highlighting real life APT attacks examples (you [...]

How Breach and Attack Simulation Helps Enterprises

Advanced Persistent Threats (APTs) put intolerable pressure on enterprise cybersecurity countermeasures. Generally reactive in nature, today’s standard cybersecurity controls are overly reliant [...]

Breach and Attack Simulation – Know Your Enemy

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. [...]

Jiu-Jitsu training and Red/Blue teaming… How are they the same?

I am super passionate about Jiu-Jitsu and InfoSec. I have been involved in InfoSec for 18 years, and Jiu-Jitsu for 10. So how am I drawing the similarities between these two art forms? Both are [...]

What is proactive cyber defense?

Cybercrime is obstructing business and governments worldwide. No longer just an IT problem, it is the biggest threat to organizations’ reputation and business continuity. Research shows 54% of [...]

These are the 61 most innovative startups in the world

Innovation doesn’t just belong to Silicon Valley — it comes from everywhere. That’s the message from the World Economic Forum sent with its annual list of the most innovative [...]

How Does IoT Expand Hackers’ Attack Surface?

What constitutes a weak link? And what can be done to mitigate growing threats via IoT?