Category: Cyber Security

A conflicting issue between usability and security is at the core of single sign on capabilities. The use of single sign on (SSO) is from the perspective of usability, a must have. SSO is required to maintain efficency within a workplace. Modern enterprise users are constantly using multiple applications, accessing, sharing, storing data across multiple

There is no disputing it: The way we manage cyber security is broken.  Today most organizations see hundreds if not thousands of cyber attacks daily, sending each of these attacks to a human analyst for investigation is no longer scalable. Our belief is that to stay effective, the Security Operation Center (SOC) will need to

by: Rod Soto and Daniel Scarberry Unless you’ve been living under a rock you are probably familiar with the recent Shadow Brokers data dump of the Equation Group tools. In that release a precision SMB backdoor was included called Double Pulsar. This backdoor is implemented by exploiting the recently patched Windows vulnerability: CVE-2017-0143. For detection,