Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Kilian Englert

Threat Update 41 – Viewer Questions

At the end of each Threat Update episode, we invite the audience to ask questions or leave comments, so we took the opportunity to respond to a few. Join Kilian...

Read More

Threat Update 40 – White House White Hat

In response to what seems like an endless barrage of cyberattacks, President Biden signed an executive order outlining steps to improve the nation’s cybersecurity posture. Key items include implementing a...

Read More

Threat Update 39 – Let Me Google That PII On You

Cloud collaboration tools like Google Drive are ubiquitous, but in our work from anywhere world, IT and security often face challenges understanding how and where personal accounts intermingle with corporate...

Read More

ReConnect – (h)Active Directory & Automation Engine

Most cyberattacks seem to have a number of common patterns like targeting Active Directory to get wider and deeper in an organization, with the ultimate goal of finding and stealing...

Read More

Threat Update 38 – The Darkside Strikes Back

Ransomware is the scourge of IT and security professionals, and the Darkside group is one of the most notorious players in this space. Join Kilian and Kyle Roth from the...

Read More

Threat Update 37 – Is SSO the new (h)Active Directory?

As organizations continue moving to cloud services at a breakneck pace, the adoption of SSO solutions has been a safe and effective way for IT teams to enable and control...

Read More

Threat Update 36 – A Supply Chain Attack By Any Other Name

The SolarWinds supply chain attack was seen as a wake-up call for many in business, IT, and security. Both attackers & defenders took notice of the attack’s effectiveness, and created...

Read More

Threat Update 35 – Healthcare Data at Risk

COVID-19 provided fertile ground for attackers to sow confusion and take advantage of healthcare organizations on the front lines. From hospitals triaging patients around the clock to pharmaceutical companies developing...

Read More

Threat Update 34 – Isn’t the Internet Supposed to be Bombproof?

The FBI recently averted a potential attack on the AWS cloud – and in the process raised many questions about the stability and redundancy of “the cloud” and the technology...

Read More

Threat Update 33 – S3 Security Suggestions & Cyber Insurance Targets

Question: What does S3 security, and cyber insurance have in common? Answer: We discuss them in the video today! That was a bit of a trick question, but two very...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.