by Liz Bush | Aug 28, 2019 | Blog, Cybersecurity, Threat Intelligence
Combating TRISIS with the MITRE ATT&CK Framework POSTED BY LIZ BUSH TRISIS malware was first discovered in August 2017 on an industrial control system at an oil refinery in Saudi Arabia. Multinational energy company, Schneider Electric, was shut down by particularly...
by Yann LeBorgne | Aug 20, 2019 | Blog, Cybersecurity
Victimology: in the shoes of a cybersecurity analyst POSTED BY YANN LE BORGNE A recent report from the government showed that 32% of businesses identified a cyber security attack in the last 12 months, and one of the most common attacks is spear-phishing – which...
by Marc Solomon | Aug 19, 2019 | Media Coverage
There was a time when the term “use case” was confined to product development meetings where software and systems engineers worked through defining why and how a product would be used in order to create requirements. Use cases remain a critical tool to ensure teams...
by Liz Bush | Aug 2, 2019 | Blog, Cybersecurity
What’s Top of Mind for Black Hat Attendees, and How We Can Help POSTED BY LIZ BUSH In preparation for Black Hat USA next week in Las Vegas, I reviewed the results from the new 2019 Black Hat Attendee Survey. The survey takes the pulse of 345 security professionals who...