Security Best Practices

Show
Security Practitioner’s Guide to Email Spoofing and Risk Reduction
January 24, 2019

In our previous extended blog, Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It, we …

read more

Introducing Our Practical Guide to Reducing Digital Risk

February 12, 2019

Download a copy of A Practical Guide to Reducing Digital Risk   Digital Footprints and Digital Shadows Back when Al …

read more

Four New Year Cyber Security Resolutions

January 3, 2019

Another year is upon us in the world of cyber-security, and few things are certain. Commentators are always prone to …

read more

Threat Actors Use of Cobalt Strike: Why Defense is Offense’s Child

November 29, 2018

I’m a big fan of the Cobalt Strike threat emulation software. Here at Digital Shadows, it’s a staple of our …

read more

Mapping the ASD Essential 8 to the Mitre ATT&CK™ framework

November 27, 2018

Australian Signals Directorate Essential 8 The Australian Signals Directorate (ASD) has published what it calls the “Essential 8”: a set …

read more

The 2017 FSB indictment and Mitre ATT&CK™

September 20, 2018

On  February 28th, 2017 the US Department of Justice indicted a notorious hacker, Alexsey Belan, and his FSB (Russia’s internal …

read more

MITRE ATT&CK™ and the North Korean Regime-Backed Programmer

September 13, 2018

On 6th September the US Department of Justice (DOJ) unsealed an indictment against a North Korean regime-backed programmer who is …

read more

Understanding Threat Modelling

August 29, 2018

What is a threat model? Threat modelling, as defined by OWASP, “works to identify, communicate, and understand threats and mitigations …

read more

Mitre ATT&CK™ and the Mueller GRU Indictment: Lessons for Organizations

July 17, 2018

A recent indictment revealed how the GRU (Russia’s Military Intelligence agency) used both influence operations and network intrusions to achieve …

read more

Reducing Your Attack Surface: From a Firehose to a Straw

July 5, 2018

What is Attack Surface Reduction? Attack Surface Reduction is a powerful tool used to protect and harden environments. It’s a …

read more

Cyber Security as Public Health

March 21, 2018

Public health, one of the great 20th century ideas, has many instructive lessons for cyber security in the 21st. Let’s …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive