Know Your Adversary, Before They ATT&CK

Know Your Adversary, Before They ATT&CK

The Cyber Kill Chain If you’re reading this blog, you likely know the basics of the cyber kill chain. You might even be able to name a few of the seven stages in the kill chain, which lays out the steps adversaries take to attack and exploit their victims. Where you...
Amazon Firestick” is to “VCR”, as “Deception” is to _________

Amazon Firestick” is to “VCR”, as “Deception” is to _________

Complete the Analogy: “Amazon Firestick” is to “VCR”, as “Deception” is to _________. Correct Answer: “Honeypot” Remember your SAT or ACT exams with the analogy questions? If so you probably got this one right. For those of us old enough to remember, Video Cassette...
The Deceptively Simple Shortcut to Visibility

The Deceptively Simple Shortcut to Visibility

If you’ve ever had a security vendor pitch their wiz-bang internal network threat prevention solution, you’ve probably thought at some point “You’re getting ahead of yourself. First we need to know what’s going on, then we can talk about active controls on the...
Deception: The Fast Track to Zero Trust Security

Deception: The Fast Track to Zero Trust Security

The Zero Trust security model is conceptually simple, but fiendishly difficult to implement at scale.  Zero Trust (ZT) simply means that we cannot trust the perimeter to keep the bad guys out, and therefore all internal network traffic must be considered malicious...