Assuming the breach

“We’ve just traced the attack... its coming from inside the house!” How do you secure your network when the bad guys already have control of your servers? It’s so hard to keep up with the attacks, maybe it’s safer to architect with the assumption that you’ve already been breached. What does this entail?

Wednesday, April 27, 2022

F5 Labs: Caging the Malicious Insider Application

 


 F5 Labs: Caging the Malicious Insider Application 

 https://www.f5.com/labs/articles/cisotociso/caging-the-malicious-insider-application


Posted by Planet Heidi at 1:48 PM

No comments:

Post a Comment

Older Post Home
Subscribe to: Post Comments (Atom)

Followers

Popular Posts

  • Great blog
    So I stumbled across this blog post the other day and really liked it. If I wasn't so lazy, I'd rewrite it, replacing all the refer...
  • Internal Vulnerability scanning
    The hardest thing about vulnerability scanning is not the scanning itself. There are literally dozens of pretty decent scanning tools and v...
  • Make your security tools: DLP
    After spending tens of thousands of dollars on commercial security solutions that did not meet our needs, our security team opted for a DIY...
  • Data Driven Security, Part: the Second
    In Part 1, Last time we loaded up 2 years worth of SSH attacks (37,000 entries) into R for analysis. A quick summary command gave us some ...
  • Speaking at "The Cloud and Big Data 2014"
    I'll be enpaneling on "Payment Card Data in the Cloud " Law Seminars International 2-day conference on The Cloud and Big Da...
  • F5 2018 Application Protection Report
    I spent over a year researching, gathering data, discussing, analyzing, designing, and writing this report. It's a complete picture of w...
  • Things used interchangeably that are not
    I keep seeing security "professionals" mixing and matching terms interchangeably that are not.  I can understand this confusion fr...
  • The Spoon Model
    The spoon theory describes the daily life of people with medical conditions and their limited energy resources for doing seemingly everyday...
  • Siracon 2015
    Excited to be presenting at this year's SiraCon in Detroit My talk will be on Third Party Risk Assessment Exposed You hear things like...
  • The "softside" of Security can be the hardest
    I just watched Leigh Honeywell's talk on " Building Secure Cultures " on the YouTubez. (BTW, it is a must watch for anyone rem...

Blog Archive

  • ▼  2022 (7)
    • ▼  April (1)
      • F5 Labs: Caging the Malicious Insider Application
    • ►  March (2)
    • ►  January (4)
  • ►  2021 (20)
    • ►  November (1)
    • ►  October (4)
    • ►  July (4)
    • ►  May (3)
    • ►  March (3)
    • ►  February (2)
    • ►  January (3)
  • ►  2020 (26)
    • ►  October (3)
    • ►  September (2)
    • ►  July (1)
    • ►  June (2)
    • ►  May (3)
    • ►  April (3)
    • ►  March (1)
    • ►  February (6)
    • ►  January (5)
  • ►  2019 (30)
    • ►  November (7)
    • ►  September (7)
    • ►  June (4)
    • ►  May (3)
    • ►  February (9)
  • ►  2018 (30)
    • ►  November (4)
    • ►  October (5)
    • ►  August (4)
    • ►  July (1)
    • ►  June (1)
    • ►  May (4)
    • ►  April (1)
    • ►  March (2)
    • ►  February (3)
    • ►  January (5)
  • ►  2017 (15)
    • ►  December (1)
    • ►  November (2)
    • ►  September (2)
    • ►  August (1)
    • ►  June (5)
    • ►  March (3)
    • ►  January (1)
  • ►  2016 (8)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (1)
    • ►  July (1)
  • ►  2015 (8)
    • ►  September (2)
    • ►  June (1)
    • ►  May (4)
    • ►  February (1)
  • ►  2014 (11)
    • ►  December (2)
    • ►  November (1)
    • ►  August (1)
    • ►  April (1)
    • ►  March (3)
    • ►  February (3)
  • ►  2013 (7)
    • ►  November (1)
    • ►  October (2)
    • ►  August (1)
    • ►  July (1)
    • ►  April (1)
    • ►  March (1)
  • ►  2012 (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (1)
    • ►  January (1)
  • ►  2011 (12)
    • ►  December (1)
    • ►  October (1)
    • ►  June (2)
    • ►  April (1)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2010 (6)
    • ►  December (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2009 (16)
    • ►  December (2)
    • ►  October (2)
    • ►  September (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (3)
    • ►  January (1)
  • ►  2008 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  July (2)
    • ►  June (3)
    • ►  May (7)

Contributors

  • FCB
  • Planet Heidi
Simple theme. Powered by Blogger.