Cybersecurity Purple Teaming Chronicles Part 1 This is the first post in a series about the tactics, techniques, and behaviors that “purple… May 22, 2020 Read More
Security Controls 2020 Verizon Data Breach Investigations Report: Analysis, Findings, and AttackIQ Commentary This week, Verizon released it’s highly anticipated annual Data Breach Investigations Report (DBIR),… May 20, 2020 Read More
Cloud Security Defeating a Cloud Breach Part 2 In the previous blog post of this series, we talked about how to simulate a breach… April 6, 2020 Read More
Cloud Security Defeating a Cloud Breach Part 1 Is My Information Secure in the Cloud? How secure is your data when it’s stored… March 30, 2020 Read More
Adversary Emulation Emulating APT29 with AttackIQ As the security posture of a company becomes more mature, providing the ability to have… February 26, 2020 Read More
Credential Dumping Attack Paths and Kill Chains – AttackIQ Contributions to the Verizon 2019 DBIR Report AttackIQ Contributions “The Verizon Data Breach Investigations Report (DBIR) provides you with crucial perspectives… June 17, 2019 Read More
TTPs The 5 Keys to Success in Evaluating a Security Validation Platform I am routinely asked what the key areas of success are for an Enterprise to… June 5, 2019 Read More
Ransomware “Locker Goga” The 2019 Addition to the Ransomware Family Below is a picture of a sign posted at the company’s entrance after the attack… April 14, 2019 Read More