Assuming the breach

“We’ve just traced the attack... its coming from inside the house!” How do you secure your network when the bad guys already have control of your servers? It’s so hard to keep up with the attacks, maybe it’s safer to architect with the assumption that you’ve already been breached. What does this entail?

Thursday, October 14, 2021

F5 Labs: Cyberattacks Targeting South Africa, January through June 2021

 


F5 Labs: Cyberattacks Targeting South Africa, January through June 2021 

https://www.f5.com/labs/articles/threat-intelligence/cyberattacks-targeting-south-africa-january-through-june-2021

Posted by Planet Heidi at 7:44 AM No comments:

F5 Labs: Protecting Critical Systems with Isolation and Jump Boxes

 



F5 Labs: Protecting Critical Systems with Isolation and Jump Boxes 

https://www.f5.com/labs/articles/cisotociso/protecting-critical-systems-with-isolation-and-jump-boxes

Posted by Planet Heidi at 7:42 AM No comments:

F5 Labs: Prioritizing Vulnerability Management Using Machine Learning (Updated)

 

F5 Labs: Prioritizing Vulnerability Management Using Machine Learning 

Updated October 12, 2021 (originally published February 14, 2020)


https://www.f5.com/labs/articles/cisotociso/prioritizing-vulnerability-management-using-machine-learning

Posted by Planet Heidi at 7:41 AM No comments:

F5 Labs: The State of the State of Application Exploits in Security Incidents



F5 Labs: The State of the State of Application Exploits in Security Incidents  

https://www.f5.com/labs/articles/threat-intelligence/the-state-of-the-state-of-application-exploits-in-security-incidents


Posted by Planet Heidi at 7:40 AM No comments:
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Followers

Popular Posts

  • Internal Vulnerability scanning
    The hardest thing about vulnerability scanning is not the scanning itself. There are literally dozens of pretty decent scanning tools and v...
  • Great blog
    So I stumbled across this blog post the other day and really liked it. If I wasn't so lazy, I'd rewrite it, replacing all the refer...
  • Make your security tools: DLP
    After spending tens of thousands of dollars on commercial security solutions that did not meet our needs, our security team opted for a DIY...
  • Data Driven Security, Part: the Second
    In Part 1, Last time we loaded up 2 years worth of SSH attacks (37,000 entries) into R for analysis. A quick summary command gave us some ...
  • Speaking at "The Cloud and Big Data 2014"
    I'll be enpaneling on "Payment Card Data in the Cloud " Law Seminars International 2-day conference on The Cloud and Big Da...
  • F5 2018 Application Protection Report
    I spent over a year researching, gathering data, discussing, analyzing, designing, and writing this report. It's a complete picture of w...
  • Things used interchangeably that are not
    I keep seeing security "professionals" mixing and matching terms interchangeably that are not.  I can understand this confusion fr...
  • The Spoon Model
    The spoon theory describes the daily life of people with medical conditions and their limited energy resources for doing seemingly everyday...
  • Siracon 2015
    Excited to be presenting at this year's SiraCon in Detroit My talk will be on Third Party Risk Assessment Exposed You hear things like...
  • The "softside" of Security can be the hardest
    I just watched Leigh Honeywell's talk on " Building Secure Cultures " on the YouTubez. (BTW, it is a must watch for anyone rem...

Blog Archive

  • ►  2022 (7)
    • ►  April (1)
    • ►  March (2)
    • ►  January (4)
  • ▼  2021 (20)
    • ►  November (1)
    • ▼  October (4)
      • F5 Labs: Cyberattacks Targeting South Africa, Janu...
      • F5 Labs: Protecting Critical Systems with Isolatio...
      • F5 Labs: Prioritizing Vulnerability Management Usi...
      • F5 Labs: The State of the State of Application Exp...
    • ►  July (4)
    • ►  May (3)
    • ►  March (3)
    • ►  February (2)
    • ►  January (3)
  • ►  2020 (26)
    • ►  October (3)
    • ►  September (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (3)
    • ►  April (3)
    • ►  March (1)
    • ►  February (6)
    • ►  January (5)
  • ►  2019 (30)
    • ►  November (7)
    • ►  September (7)
    • ►  June (4)
    • ►  May (3)
    • ►  February (9)
  • ►  2018 (30)
    • ►  November (4)
    • ►  October (5)
    • ►  August (4)
    • ►  July (1)
    • ►  June (1)
    • ►  May (4)
    • ►  April (1)
    • ►  March (2)
    • ►  February (3)
    • ►  January (5)
  • ►  2017 (15)
    • ►  December (1)
    • ►  November (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (5)
    • ►  March (3)
    • ►  January (1)
  • ►  2016 (8)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (1)
    • ►  July (1)
  • ►  2015 (8)
    • ►  September (2)
    • ►  June (1)
    • ►  May (4)
    • ►  February (1)
  • ►  2014 (11)
    • ►  December (2)
    • ►  November (1)
    • ►  August (1)
    • ►  April (1)
    • ►  March (3)
    • ►  February (3)
  • ►  2013 (7)
    • ►  November (1)
    • ►  October (2)
    • ►  August (1)
    • ►  July (1)
    • ►  April (1)
    • ►  March (1)
  • ►  2012 (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (1)
    • ►  January (1)
  • ►  2011 (12)
    • ►  December (1)
    • ►  October (1)
    • ►  June (2)
    • ►  April (1)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2010 (6)
    • ►  December (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2009 (16)
    • ►  December (2)
    • ►  October (2)
    • ►  September (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (3)
    • ►  January (1)
  • ►  2008 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  July (2)
    • ►  June (3)
    • ►  May (7)

Contributors

  • FCB
  • Planet Heidi
Simple theme. Powered by Blogger.