Alissa KnightAll That We Let In: Hacking mHealth Apps and APIs (Part 2)Introduction·11 min read·Dec 1, 2020----
Alissa KnightAll That We Let In: Hacking Mobile Health APIs (Part 1)Introduction·7 min read·Dec 1, 2020----
Alissa KnightHacking GSM: Building a Rogue Base Station to Hack Cellular DevicesIntroduction·6 min read·Dec 1, 2020----
Alissa KnightinDataDrivenInvestorLiars and Saints: Demystifying Cyber Deception, MITRE Shield, and Active Defense (Part 1)How MITRE Shield has turned cyber deception technology into a business imperative to deny a contested network to adversaries.·6 min read·Nov 30, 2020----
Alissa KnightinDataDrivenInvestorHacking Bluetooth low energy (BLE) smart devicesThis article is written for penetration testers wanting to learn how to hack Bluetooth low energy (BLE) smart devices using relay attacks…·8 min read·Jun 11, 2020----
Alissa KnightinDataDrivenInvestorOutbreak: Data Security in the New Era of PandemicsAlissa Knight’s latest thought-leadership addresses a growing concern in data security of trade secrets, intellectual property, and…·8 min read·Jun 3, 2020----
Alissa KnightinDataDrivenInvestorWhen the bough breaks: The end of the SIEM era and rise of ELKThe story behind the mass exodus of enterprises from SIEM to Elastic·5 min read·Feb 21, 2020--1--1
Alissa KnightinDataDrivenInvestorMemoirs of an API Hacker: Intercepting Encrypted Mobile Traffic to Hack a Bank’s API Server“Abashed the devil stood and felt how awful goodness is and saw Virtue in her shape how lovely: and pined his loss” -John Milton·6 min read·Jan 22, 2020--1--1
Alissa KnightinDataDrivenInvestorThe Butterfly Effect: The Changing Winds on the SIEM MarketThe idea here is that small changes — the burgeoning amount of unstructured data being generated in the enterprise, the interminable event…·4 min read·Nov 8, 2019----
Alissa KnightinDataDrivenInvestorUndivided We Fall: Decoupling Network Segmentation from Micro-Segmentation in the Software Defined…Introduction·5 min read·Sep 11, 2019----