contact us

Rating Criticality of Technology Assets

Article written by: Thomas Dugas (CISO, Duquesne University) and Doug McDorman (Principal Security Architect, T-Mobile)A key task of any cyber-risk assessment is determining which technology assets are most important to the business. The most...
Rating Criticality of Technology Assets

Rating Criticality of Technology Assets

Latest Article written by: Thomas Dugas (CISO, Duquesne University) and Doug McDorman (Principal Security Architect, T-Mobile)A key task of any cyber-risk assessment is determining which technology assets are most important to the business. The most critical assets... read more
Cyberthreat Risk Modeling and Scoring

Cyberthreat Risk Modeling and Scoring

Latest Article written by: Nir Yizhak (CISO & DPO, Gigya) and Antonio D’Argenio (Security Architect, Tech Data Corporation)Indentifying and quantifying cyber-risk are essential for effective risk prioritization. Risk scoring not only helps identify and mitigate... read more
DEF CON 26 and DerbyCon 2018 Blog and Video

DEF CON 26 and DerbyCon 2018 Blog and Video

Latest Demystifying MS17-010: Reverse Engineering the Eternal Exploits MS17-010 is the most important patch in the history of operating systems, fixing remote code execution vulnerabilities in the world of modern Windows. The ETERNAL exploits, written by the Equation... read more
Koadic: New Features and Video Demonstration

Koadic: New Features and Video Demonstration

Latest Koadic, or COM Command & Control, is a Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire. The major difference is that Koadic does most of its operations using Windows Script Host (i.e,... read more
Questions for Executives on Cyber

Questions for Executives on Cyber

Latest By Ed Amoroso, Founder and CEO of TAG Cyber During my career, it’s been my honor to have served alongside some of the most capable and talented corporate executives in the world. One such executive, Andy Geisse, now serves as Operating Partner at Bessemer... read more
Prioritize Your Remediation Across a Growing Attack Surface