What is Machine Learning? Machine learning has been referred to as “the science of getting computers to act without being explicitly programmed.” What is machine…
What is OSINT? In “Breaking the Kill Chain: A Defensive Approach,” we took a look at the seven steps an attacker generally goes through in…
Active Reconnaissance The cybersecurity kill chain by Lockheed Martin walks us through the seven sequential steps an attacker will commonly follow during an attack. Previously,…
Secure Access Service Edge, or SASE, is a term coined by Gartner that combines multiple network and security technologies into a single offering. The goal…
You may not be familiar with web beacons, but chances are you interact with them every day and don’t even know it. Web beacons are…
Introduction So you have this highly sophisticated and powerful firewall on your network with all the bells and whistles turned on. And considering how much…
On Monday, Jan 6th, DHS warned US organizations about potential cyber-attacks from Iran and Iran-backed APT groups. The CISA alert was the first public acknowledgment…
VNF, or Virtualized Network Function, refers to the process of virtualizing traditional networking and security functions into services. In practical terms, this means running several…
Gartner predicts that by 2023, 93% of organizations will be doing some form of SDWAN for the WAN edge. And the reasons for this disruption…
The ATT&CK framework developed by MITRE expands on the last three steps of the kill chain by giving us twelve more granular categories to replace the installation, command and control, and actions and objectives phase of the kill chain