Security Best Practices


Mitre ATT&CK™ and the Mueller GRU Indictment: Lessons for Organizations

July 17, 2018

A recent indictment revealed how the GRU (Russia’s Military Intelligence agency) used both influence operations and network intrusions to achieve …

read more

Reducing Your Attack Surface: From a Firehose to a Straw

July 5, 2018

What is Attack Surface Reduction? Attack Surface Reduction is a powerful tool used to protect and harden environments. It’s a …

read more

Cyber Security as Public Health

March 21, 2018

Public health, one of the great 20th century ideas, has many instructive lessons for cyber security in the 21st. Let’s …

read more

Prioritize to Avoid Security Nihilism

February 20, 2018

In many situations associated with cyber security, in particular defending an organization, it is easy to get overwhelmed with not …

read more

What Attackers Want for Christmas

December 22, 2017

Our guest author Krampus has a special blog post for the Team with the festive Red colours: Christmas lists are …

read more

Why “Have a Safe Trip” Is Taking On Greater Meaning

November 14, 2017

This post originally appeared on SecurityWeek. Have a safe trip! Typically, when we wish someone well before they leave on a …

read more

PowerShell Security Best Practices

September 27, 2017

Threat actors have long since used legitimate tools to infiltrate and laterally move across defender’s networks. The reasons for this …

read more

5 Lessons from WannaCry: Preventing Attacks with Security Engineering

May 16, 2017

With the recent news storm concerning the “WannaCry” ransomware worm, a great deal of mitigation advice has been provided. This …

read more

Authentication Nation: 5 Ways NIST is Changing How We Think About Passwords

May 9, 2017

Passwords have taken a beating over the past several years, and there seems to be little question among leading practitioners …

read more

Five Tips For Better Email Security

November 8, 2016

While security is everyone’s responsibility, it’s not always easy to get right. Our “Security Best Practices” blog series will provide …

read more