Two security researchers from Watchtowr labs had a fun night in Vegas (no not that kind) and managed to find some fundamental flows in the way a top-level domain (TLD) is used. The entire story ...
The cornerstone of Security Energy is determining which defense capabilities need to be implemented by predicting the capabilities that a cyber adversary will use against you (reference Influence Energy post). In a few weeks, I'll release a Github project mapping all MITRE ATT&CK techniques int...
This crucial question drives risk management and selection of defenses. The security community embellishes every new discovery as if every organization needs to drop everything and panic. At the same time, security vendors claim their product will secure you against all advanced threats. This dicho...