Search

ArmorText
Blogs & Articles

Guarding The Guardians: How Secure Comms Outwit Cyber Spies

Embracing the military ethos of staying ‘Left of Bang’ – a proactive rather than reactive approach to threats – is pivotal for Security Operations, DevSecOps, and Threat Intel Sharing communications. These areas are lucrative targets for threat actors intending to sustain or propagate attacks. This strategy entails implementing safeguarding measures not just in the aftermath of a breach, but before potential threats are realized.

Continue Reading…

Cybersecurity is a Shared Responsibility

In today’s interconnected world, the cybersecurity landscape is evolving at an unprecedented pace. Two major perspectives have emerged in the discourse, with one focusing on organizational accountability for cybersecurity and the other shifting the responsibility from customers to manufacturers. These viewpoints are not mutually exclusive, but rather, they form a composite picture of the cybersecurity reality we face today.

Continue Reading…

A New Era for E-Discovery: RSMF Support Added to ArmorText for Reviewers

With official support for the export of selected ranges of retained records by Reviewers within their Scopes-of-Review into the RSMF format, ArmorText is taking a significant step forward in the realm of e-Discovery. RSMF format allows for the seamless import and analysis of various types of digital communications for e-Discovery. This includes emails, chats, instant messages, SMS, MMS, and now ArmorText.

Continue Reading…

What Makes DEV-0537 / LAPSUS$ So Dangerous?

Regardless of how the threat actor gains initial access, reconnaissance & privilege escalation and ultimately, Exfiltration, destruction, and extortion are their aim. DEV-0537 / LAPSUS$ joins its victims’ crisis communication calls and internal discussion boards (Slack, Teams, conference calls, and others) to understand the incident response workflow and their corresponding response.

Continue Reading…
Search