by Mohammad Mobasseri | Apr 17, 2019 | Uncategorised
by Benjamin H. Sherman — April 11, 2019 Growing Beyond “I AM ROOT” Most organizations are still hybrid cloud adopters. They’ve achieved a level of virtualization, but have yet to fully liberate themselves from the OS/server and network hardware access...
by Mohammad Mobasseri | Mar 10, 2019 | Uncategorised
In Episode 007 of my Linux Attack and Defense webinar series, I attack a James Bond-themed, intentionally-vulnerable capture the flag (CTF) system created by “creosote.” Playing this CTF, I chain together attacks. While many of the steps are...
by Mohammad Mobasseri | Mar 10, 2019 | Uncategorised
By Morey Haber By definition, a zero trust security model advocates the creation of zones and segmentation to control sensitive IT resources. This also entails the deployment of technology to monitor and manage data between zones, and more importantly, user...
by Mohammad Mobasseri | Mar 10, 2019 | Uncategorised
Morey Haber, CTO of BeyondTrust, joins us to talk about Privileged Access Management and the missteps companies may make when trying to handle their administrative rights. Companies rely on BeyondTrust to shrink attack surfaces and identify imminent threats,...