Hacking GSM: Building a Rogue Base Station to Hack Cellular DevicesIntroductionDec 1, 2020Dec 1, 2020
Published inDataDrivenInvestorLiars and Saints: Demystifying Cyber Deception, MITRE Shield, and Active Defense (Part 1)How MITRE Shield has turned cyber deception technology into a business imperative to deny a contested network to adversaries.Nov 30, 2020Nov 30, 2020
Published inDataDrivenInvestorHacking Bluetooth low energy (BLE) smart devicesThis article is written for penetration testers wanting to learn how to hack Bluetooth low energy (BLE) smart devices using relay attacks…Jun 11, 2020Jun 11, 2020
Published inDataDrivenInvestorOutbreak: Data Security in the New Era of PandemicsAlissa Knight’s latest thought-leadership addresses a growing concern in data security of trade secrets, intellectual property, and…Jun 3, 2020Jun 3, 2020
Published inDataDrivenInvestorWhen the bough breaks: The end of the SIEM era and rise of ELKThe story behind the mass exodus of enterprises from SIEM to ElasticFeb 21, 20201Feb 21, 20201
Published inDataDrivenInvestorMemoirs of an API Hacker: Intercepting Encrypted Mobile Traffic to Hack a Bank’s API Server“Abashed the devil stood and felt how awful goodness is and saw Virtue in her shape how lovely: and pined his loss” -John MiltonJan 22, 20201Jan 22, 20201
Published inDataDrivenInvestorThe Butterfly Effect: The Changing Winds on the SIEM MarketThe idea here is that small changes — the burgeoning amount of unstructured data being generated in the enterprise, the interminable event…Nov 8, 2019Nov 8, 2019
Published inDataDrivenInvestorUndivided We Fall: Decoupling Network Segmentation from Micro-Segmentation in the Software Defined…IntroductionSep 11, 2019Sep 11, 2019