Assuming the breach

“We’ve just traced the attack... its coming from inside the house!” How do you secure your network when the bad guys already have control of your servers? It’s so hard to keep up with the attacks, maybe it’s safer to architect with the assumption that you’ve already been breached. What does this entail?

Wednesday, April 27, 2022

F5 Labs: Caging the Malicious Insider Application

 


 F5 Labs: Caging the Malicious Insider Application 

 https://www.f5.com/labs/articles/cisotociso/caging-the-malicious-insider-application


Posted by Planet Heidi at 1:48 PM No comments:

Thursday, March 10, 2022

F5 Labs: Cybersecurity Predictions for 2022 from F5 Labs (and Friends)

 


F5 Labs: Cybersecurity Predictions for 2022 from F5 Labs (and Friends) 

https://www.f5.com/labs/articles/cisotociso/cybersecurity-predictions-for-2022-from-f5-labs-and-friends


Posted by Planet Heidi at 12:52 PM No comments:

F5 Labs: 2022 Application Protection Report: In Expectation of Exfiltration

 


F5 Labs: 2022 Application Protection Report: In Expectation of Exfiltration


https://www.f5.com/labs/articles/threat-intelligence/2022-application-protection-report-in-expectation-of-exfiltration


Posted by Planet Heidi at 12:48 PM No comments:

Tuesday, January 4, 2022

F5 Labs: Holiday Phishing Trends For 2021

 


 

F5 Labs: Holiday Phishing Trends For 2021 

https://www.f5.com/labs/articles/threat-intelligence/holiday-phishing-trends-for-2021

Posted by Planet Heidi at 8:07 AM No comments:

F5 Labs: How Global Cyberthreats Changed Over 2021

 


 

F5 Labs: How Global Cyberthreats Changed Over 2021 

https://www.f5.com/labs/articles/threat-intelligence/how-global-cyberthreats-changed-over-2021

Posted by Planet Heidi at 8:04 AM No comments:

F5 Labs: The Ins and Outs of Digital Fraud

 

 


 

F5 Labs: The Ins and Outs of Digital Fraud

https://www.f5.com/labs/articles/cisotociso/the-ins-and-outs-of-digital-fraud

Posted by Planet Heidi at 8:03 AM No comments:

F5 Labs: Log4Shell: Rebooting (The Same Old) Security Principles In its Wake




 F5 Labs: Log4Shell: Rebooting (The Same Old) Security Principles In its Wake 

 

https://www.f5.com/labs/articles/cisotociso/log4shell-rebooting-the-same-old-security-principles-in-its-wake

Posted by Planet Heidi at 8:01 AM No comments:
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Followers

Popular Posts

  • Great blog
    So I stumbled across this blog post the other day and really liked it. If I wasn't so lazy, I'd rewrite it, replacing all the refer...
  • Internal Vulnerability scanning
    The hardest thing about vulnerability scanning is not the scanning itself. There are literally dozens of pretty decent scanning tools and v...
  • Make your security tools: DLP
    After spending tens of thousands of dollars on commercial security solutions that did not meet our needs, our security team opted for a DIY...
  • Data Driven Security, Part: the Second
    In Part 1, Last time we loaded up 2 years worth of SSH attacks (37,000 entries) into R for analysis. A quick summary command gave us some ...
  • Speaking at "The Cloud and Big Data 2014"
    I'll be enpaneling on "Payment Card Data in the Cloud " Law Seminars International 2-day conference on The Cloud and Big Da...
  • F5 2018 Application Protection Report
    I spent over a year researching, gathering data, discussing, analyzing, designing, and writing this report. It's a complete picture of w...
  • Things used interchangeably that are not
    I keep seeing security "professionals" mixing and matching terms interchangeably that are not.  I can understand this confusion fr...
  • The Spoon Model
    The spoon theory describes the daily life of people with medical conditions and their limited energy resources for doing seemingly everyday...
  • Siracon 2015
    Excited to be presenting at this year's SiraCon in Detroit My talk will be on Third Party Risk Assessment Exposed You hear things like...
  • The "softside" of Security can be the hardest
    I just watched Leigh Honeywell's talk on " Building Secure Cultures " on the YouTubez. (BTW, it is a must watch for anyone rem...

Blog Archive

  • ▼  2022 (7)
    • ▼  April (1)
      • F5 Labs: Caging the Malicious Insider Application
    • ►  March (2)
      • F5 Labs: Cybersecurity Predictions for 2022 from F...
      • F5 Labs: 2022 Application Protection Report: In Ex...
    • ►  January (4)
      • F5 Labs: Holiday Phishing Trends For 2021
      • F5 Labs: How Global Cyberthreats Changed Over 2021
      • F5 Labs: The Ins and Outs of Digital Fraud
      • F5 Labs: Log4Shell: Rebooting (The Same Old) Secur...
  • ►  2021 (20)
    • ►  November (1)
    • ►  October (4)
    • ►  July (4)
    • ►  May (3)
    • ►  March (3)
    • ►  February (2)
    • ►  January (3)
  • ►  2020 (26)
    • ►  October (3)
    • ►  September (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (3)
    • ►  April (3)
    • ►  March (1)
    • ►  February (6)
    • ►  January (5)
  • ►  2019 (30)
    • ►  November (7)
    • ►  September (7)
    • ►  June (4)
    • ►  May (3)
    • ►  February (9)
  • ►  2018 (30)
    • ►  November (4)
    • ►  October (5)
    • ►  August (4)
    • ►  July (1)
    • ►  June (1)
    • ►  May (4)
    • ►  April (1)
    • ►  March (2)
    • ►  February (3)
    • ►  January (5)
  • ►  2017 (15)
    • ►  December (1)
    • ►  November (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (5)
    • ►  March (3)
    • ►  January (1)
  • ►  2016 (8)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (1)
    • ►  July (1)
  • ►  2015 (8)
    • ►  September (2)
    • ►  June (1)
    • ►  May (4)
    • ►  February (1)
  • ►  2014 (11)
    • ►  December (2)
    • ►  November (1)
    • ►  August (1)
    • ►  April (1)
    • ►  March (3)
    • ►  February (3)
  • ►  2013 (7)
    • ►  November (1)
    • ►  October (2)
    • ►  August (1)
    • ►  July (1)
    • ►  April (1)
    • ►  March (1)
  • ►  2012 (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (1)
    • ►  January (1)
  • ►  2011 (12)
    • ►  December (1)
    • ►  October (1)
    • ►  June (2)
    • ►  April (1)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2010 (6)
    • ►  December (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2009 (16)
    • ►  December (2)
    • ►  October (2)
    • ►  September (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (3)
    • ►  January (1)
  • ►  2008 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  July (2)
    • ►  June (3)
    • ►  May (7)

Contributors

  • FCB
  • Planet Heidi
Simple theme. Powered by Blogger.