Alissa KnightAll That We Let In: Hacking mHealth Apps and APIs (Part 2)IntroductionDec 1, 2020Dec 1, 2020
Alissa KnightAll That We Let In: Hacking Mobile Health APIs (Part 1)IntroductionDec 1, 2020Dec 1, 2020
Alissa KnightHacking GSM: Building a Rogue Base Station to Hack Cellular DevicesIntroductionDec 1, 2020Dec 1, 2020
Alissa KnightinDataDrivenInvestorLiars and Saints: Demystifying Cyber Deception, MITRE Shield, and Active Defense (Part 1)How MITRE Shield has turned cyber deception technology into a business imperative to deny a contested network to adversaries.Nov 30, 2020Nov 30, 2020
Alissa KnightinDataDrivenInvestorHacking Bluetooth low energy (BLE) smart devicesThis article is written for penetration testers wanting to learn how to hack Bluetooth low energy (BLE) smart devices using relay attacks…Jun 11, 2020Jun 11, 2020
Alissa KnightinDataDrivenInvestorOutbreak: Data Security in the New Era of PandemicsAlissa Knight’s latest thought-leadership addresses a growing concern in data security of trade secrets, intellectual property, and…Jun 3, 2020Jun 3, 2020
Alissa KnightinDataDrivenInvestorWhen the bough breaks: The end of the SIEM era and rise of ELKThe story behind the mass exodus of enterprises from SIEM to ElasticFeb 21, 20201Feb 21, 20201
Alissa KnightinDataDrivenInvestorMemoirs of an API Hacker: Intercepting Encrypted Mobile Traffic to Hack a Bank’s API Server“Abashed the devil stood and felt how awful goodness is and saw Virtue in her shape how lovely: and pined his loss” -John MiltonJan 22, 20201Jan 22, 20201
Alissa KnightinDataDrivenInvestorThe Butterfly Effect: The Changing Winds on the SIEM MarketThe idea here is that small changes — the burgeoning amount of unstructured data being generated in the enterprise, the interminable event…Nov 8, 2019Nov 8, 2019
Alissa KnightinDataDrivenInvestorUndivided We Fall: Decoupling Network Segmentation from Micro-Segmentation in the Software Defined…IntroductionSep 11, 2019Sep 11, 2019