Adaptive Emulation (Part 2): Execution Methods
In part 1 of my adaptive emulation blog series, we covered how small...
In part 1 of my adaptive emulation blog series, we covered how small...
This week, Okta shared a postmortem for its recent incident. Much has been said...
Over the course of my cybersecurity career, I’ve been fortunate to work in...
A Special Thanks The TTP Pyramid expands David Bianco’s Pyramid of Pain. We...
A few weeks ago , while watching the Hadza: Last of the First documentary, I...
INTRODUCTION Before we get into the nitty gritty of things, I’d like to...
The movement to “shift security left” focuses on mitigating risk as early...
Over the last two years, it's been pretty clear that ransomware is a...
TLDR: One of the best-known ways to gain access into an organization and...