Exclusive Cybersecurity Insight from Solutionary
Does your organization face challenges with effectively aligning IT security teams and business executives? In many organizations, it seems that business executives and IT security teams don't always understand each other's roles. Executive leadership may not realize the cyber risks to their organization, such as APT threats, insider threats, espionage, phishing. Also, IT security teams may not know what business systems are MOST important to protect before and during an incident.
So how can you successfully align IT security with the C-Suite, and keep the collaborative alignment effective? Before we answer that question, let's first talk about the challenges that have historically kept IT security and business executives out of alignment.
Strategic vision directly influences and impacts the success of implementation of IT security controls. IT security MUST be positioned as a business enabler. And businesses must... read more >
How long is too long?
There has been a lot of chatter on social media lately surrounding the topic of public vulnerability disclosure. Doing a quick Google search, I found a ton of resources, discussions and blog posts available, covering different ways to properly disclose a vulnerability. Several are listed below:
Many types of red team and physical security assessment toolkits are utilized across the industry. Through our experiences in the NTT Security Threat Services group, we have developed a mixed bag of devices and tools that we commonly use with hybrid assessment types.
The lists below are not intended to be comprehensive, but a quick reference for red team specific toolkits - which often include technical devices and physical tools.
As always, it is assumed that you have permission from your client, have the proper documentation on hand and the defined scope is your primary consideration before attempting to compromise a target facility. Please make sure that you have plenty of experience with bypass and lock picking tools in order to reduce the risk of damaging doors, locking cores and mechanisms etc. Always be... read more >
A recap of RSAC 2017
RSA 2017 finished up last week - thousands of security professionals descended upon the Golden City, ready to learn about the newest technology.
If you made it to our booth, you heard us discuss how digital transformation is having a substantial impact on organizations in every industry. The cloud is becoming harder to navigate, with more products and solutions offered than ever before. On top of that, many organizations with a security program in place, are wondering how to keep up with the threat landscape and digitization.
I touched on this during my interview with Illena Armstrong, VP Editorial, SC Media at RSA. Organizations need a strong and flexible security program that is able to adopt and transition to new technological advancements for your organization. Watch the full interview below to learn about how the ability to adopt solutions faster can be cost saving, and key things to consider in the digital transformation... read more >
Phishers & Scammers & Taxes, Oh My!
Our new Constitution is now established, and has an appearance that promises permanency; but in this world nothing can be said to be certain, except death and taxes.
— Benjamin Franklin
It’s that time of year — tax season. Regardless of whether you owe or are expecting a refund, there is one thing we all should be looking out for: people who want to take your money. This is a good time of year to remember one of the least technical, but certainly one of the most dangerous aspects of our industry, social engineering.
Whether by email through a phishing scheme or via telephone and fear, there is a possibility that you will be contacted in an attempt to access your IRS records, or pushed to send money to an unauthorized, but reputable sounding party.
Here are just some of the potential social engineering scams you might see:A tax company appears... read more >
Find out how ELMO can assist with a live incident response situation
In most incident response situations, it is necessary to collect some form of volatile data. While disk forensics continue to play a role in incident response, we know that the tactics of today’s adversaries require different methods from incident responders. One of those tactics is live forensics to capture volatile data.
Much like traditional “dead box” forensics, most investigators will agree that no single tool can meet the needs of every investigation. Instead, investigators commonly use multiple tools to gather information based on the needs of the investigation. Some examples are memory acquisition, running processes, network connections and open file handles.
Running these tools in a Windows environment is most often achieved by scripting multiple tools through the use of a batch file. This achieves several goals. First, it allows the investigator to execute a single file, which will run multiple tools. Second, it ensures that all tools are... read more >
While there are many articles directed at assessors and consultants on “what not to do” during a penetration assessment, I haven’t seen many blogs directed towards what things clients should avoid when preparing for a penetration assessment. I wanted to address this topic, and share from experience, pitfalls that can often hinder the progress and quality of a penetration assessment.What is a "Penetration Assessment"?
Penetration assessments are a way to identify an organization’s risks by simulating common threats. These assessments can target a wide range of scenarios; such as, external service attacks, insider threats, social engineering and physical intrusion. Once these vulnerabilities have been identified and exploited, that information is then compiled into a report and passed on to the client for... read more >