contact us

Rating Criticality of Technology Assets

Article written by: Thomas Dugas (CISO, Duquesne University) and Doug McDorman (Principal Security Architect, T-Mobile)A key task of any cyber-risk assessment is determining which technology assets are most important to the business. The most...

Cyberthreat Risk Modeling and Scoring

Article written by: Nir Yizhak (CISO & DPO, Gigya) and Antonio D’Argenio (Security Architect, Tech Data Corporation)Indentifying and quantifying cyber-risk are essential for effective risk prioritization. Risk scoring not only helps identify...

read more

DEF CON 26 and DerbyCon 2018 Blog and Video

Demystifying MS17-010: Reverse Engineering the Eternal Exploits MS17-010 is the most important patch in the history of operating systems, fixing remote code execution vulnerabilities in the world of modern Windows. The ETERNAL exploits, written...

read more

Koadic: New Features and Video Demonstration

Koadic, or COM Command & Control, is a Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire. The major difference is that Koadic does most of its operations using Windows Script Host...

read more

Questions for Executives on Cyber

By Ed Amoroso, Founder and CEO of TAG Cyber During my career, it’s been my honor to have served alongside some of the most capable and talented corporate executives in the world. One such executive, Andy Geisse, now serves as Operating Partner...

read more

Watch Those Robots

Are you worried about security for robots? I am. I worked with welding robots many, many years ago. They were not networked, and they ran on proprietary embedded systems and code. Twenty-five years later, I remember being briefed by a...

read more
Prioritize Your Remediation Across a Growing Attack Surface