Announcing: ‘Cyber Resilience: Incident Response Tabletop Exercises 2023’

We collaborated with law firm Crowell & Moring to release ‘Cyber Resilience: Incident Response Tabletop Exercises 2023’ because like us they recognize that there is no better tool than preparedness. We believe making this guide publicly available to a wider audience is vastly more valuable than any short term monetary gain.

Guarding The Guardians: How Secure Comms Outwit Cyber Spies

Embracing the military ethos of staying ‘Left of Bang’ – a proactive rather than reactive approach to threats – is pivotal for Security Operations, DevSecOps, and Threat Intel Sharing communications. These areas are lucrative targets for threat actors intending to sustain or propagate attacks. This strategy entails implementing safeguarding measures not just in the aftermath of a breach, but before potential threats are realized.

Cybersecurity is a Shared Responsibility

In today’s interconnected world, the cybersecurity landscape is evolving at an unprecedented pace. Two major perspectives have emerged in the discourse, with one focusing on organizational accountability for cybersecurity and the other shifting the responsibility from customers to manufacturers. These viewpoints are not mutually exclusive, but rather, they form a composite picture of the cybersecurity reality we face today.

A New Era for E-Discovery: RSMF Support Added to ArmorText for Reviewers

With official support for the export of selected ranges of retained records by Reviewers within their Scopes-of-Review into the RSMF format, ArmorText is taking a significant step forward in the realm of e-Discovery. RSMF format allows for the seamless import and analysis of various types of digital communications for e-Discovery. This includes emails, chats, instant messages, SMS, MMS, and now ArmorText.

DoD’s Email Leaks Prove We Need Stronger Protocols Now More Than Ever

An email server’s sensitive but unclassified contents, including emails pertaining to USSOCOM operations, were left exposed to anyone on the internet with the server’s IP address. It is time to adopt protocols built from the ground up with end-to-end encryption to protect sensitive collaboration and communications.

What Makes DEV-0537 / LAPSUS$ So Dangerous?

Regardless of how the threat actor gains initial access, reconnaissance & privilege escalation and ultimately, Exfiltration, destruction, and extortion are their aim. DEV-0537 / LAPSUS$ joins its victims’ crisis communication calls and internal discussion boards (Slack, Teams, conference calls, and others) to understand the incident response workflow and their corresponding response.