Dark Mode

    Free Trial
    Image of Ilan Mintz
    • 6 min read

    Safe Remediation

    Managing configurations, patching, and updating system controls is one of the most notably difficult things that any CISO has to deal with. But it is one of the most critical to manage, as a...

    Safe Remediation

    Managing configurations, patching, and updating system controls is one of the most notably difficult things that any CISO has to deal with. But it is one of the most critical to manage, as a...

    6 min read
    • 5 min read

    Automated Fixes

    Most often I have found that the issue of addressing the problem is more pressing than simply identifying the threat. We have a massive, multi billion dollar, industry dedicated solely to “s...

    Automated Fixes

    Most often I have found that the issue of addressing the problem is more pressing than simply identifying the threat. We have a massive, multi billion dollar, industry dedicated solely to “s...

    5 min read
    • 4 min read

    Lateral Movement is the Key Issue

    Black Hat USA 2021 was pretty sparsely attended but to be honest we enjoyed the show! Having finally gotten home it took me a week or so to decompress from all the travel and the meetings bu...

    Lateral Movement is the Key Issue

    Black Hat USA 2021 was pretty sparsely attended but to be honest we enjoyed the show! Having finally gotten home it took me a week or so to decompress from all the travel and the meetings bu...

    4 min read
    • 4 min read

    Misconfigurations – The Real Vulnerability

    As a definition, a vulnerability is something, anything that an attacker can target and exploit in order to access an application or environment, or possibly a user.

    Misconfigurations – The Real Vulnerability

    As a definition, a vulnerability is something, anything that an attacker can target and exploit in order to access an application or environment, or possibly a user.

    4 min read
    • 4 min read

    AD Threats

    Active Directory Threats

    AD Threats

    Active Directory Threats

    4 min read
    • 1 min read

    Scripts

    Scripts When you’re missing a security check and decide to implement it yourself.

    Scripts

    Scripts When you’re missing a security check and decide to implement it yourself.

    1 min read
    • 1 min read

    Dear Diary

    Dear diary,

    Dear Diary

    Dear diary,

    1 min read
    • 1 min read

    You can’t see the forest for the trees!

    You can’t see the forest for the trees!

    You can’t see the forest for the trees!

    You can’t see the forest for the trees!

    1 min read
    • 4 min read

    Strategic Cyber Process Part Three

    Is the “problem” many “problems?

    Strategic Cyber Process Part Three

    Is the “problem” many “problems?

    4 min read