Over the last 2 years, our team has been researching a number of platforms, frameworks, trainings, and various definitions of Endpoint Detection & Response (EDR) technology. And of course, the newest hot buzzword in cybersecurity: “Threat Hunting.” After all this research, we have a team put together and have partnered with a platform we believe in, allowing us to be able to offer this...
Over the last couple of weeks, we’ve noticed an uptick in phishing emails that are using fake DocuSign sites to attempt to steal credentials to user email accounts.
Infogressive’s engineers are a special kind of broken. We like to learn and put ourselves through things that are REALLY hard just because we’re curious… (and a little masochistic).
When I was new to the company, I shadowed on an Incident Response lead by one of our vendor partners, and was introduced to the world of forensics.
Surviving as a professional in the cybersecurity realm is no easy task, but the need for more of us is ever-increasing.
Below are some tips and tools that you might find useful if cybersecurity has been entrusted to you.
As an all-around nerd, not just a security nerd, I spend a lot of time checking out non security related blogs that involve a lot of technology. One in particular is Lifehacker.com. They usually have some pretty interesting blurbs about software or attacking a problem in a different way. Nothing too heavy, but still useful.
People familiar with Hypertext Transfer Protocol Security (HTTPS) know it protects online activities and communications by applying Secure Sockets Layer (SSL) encryption to web traffic. This is a benefit to organizations that need to shield private data from exposure. And what organization doesn’t?
It’s no secret that 2016 was a rough year in terms of cybersecurity attacks. We saw big name breaches at the IRS, Verizon, the DNC, LinkedIn, and who could forget- Yahoo!
But while those breaches are top-of-mind and easy to remember, it’s important to also remember the impact hackers had on small businesses this year.
Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. “Oh crap. What’d they hit? Where’s it going? What IS this?!”
Recently, we noticed such a hit with one of our customers in the financial world.
The SANS Institute is a cooperative research and education organization that reaches more than 165,000 security professionals around the world. Their programs undergo constant scrutiny and revision to ensure that the content is both on point and represents the state of the information security landscape as it stands today.
Privileged accounts represent one of the largest vulnerabilities an organization faces today in network security. It doesn’t matter if the accounts are compromised by an external attacker or a malicious insider. If privileged accounts are in the hands of an adversary it is a very real and scary threat.
Log analysis. It’s a thing. First reactions are probably going to be “Yuck,” “Make the new guy do it,” “Insert expletive here,” or the more common “Why? What broke now?”