Skip to content

Shadow IT

Below are interesting blogs on Shadow IT Discovery

Maze Ransomware Hits Fortune 500 Company Cognizant: What Can We Learn?

It’s not new news but it’s shocking how large enterprises are becoming victims, these are challenging times. Cognizant (A large fortune 500 company) was seen to notify customers of a compromise and more details. This particular ransomware is particularly dangerous as it steals data before encrypting it and next threatens to release it if the… Read More »Maze Ransomware Hits Fortune 500 Company Cognizant: What Can We Learn?

SaltStack Advisory (Vulnerability, Impact, Remediation)

This blog was authored by Jitendra Chauhan, Head R&D, FireCompass Salk Stack is  A configuration management system. Salt is capable of maintaining remote nodes in defined states. For example, it can ensure that specific packages are installed and that specific services are running. A distributed remote execution system used to execute commands and query data on… Read More »SaltStack Advisory (Vulnerability, Impact, Remediation)

CISO Guide To Dealing With Stress During Covid 19 Practical Strategies & Tactics

Social distancing, remote working, unstable times, unpredictable futures – we are all battling with one or all these issues in this COVID-19 ridden days.  As security professionals we understand the importance of building a resilient security program which can not only protect but also detect, respond and recover from a security incident. But what about… Read More »CISO Guide To Dealing With Stress During Covid 19 Practical Strategies & Tactics

Top 12 Talks On ‘Red Teaming & Purple Teaming’ from Security Conferences

1. Red Team vs. Blue Team on AWS 2. Red Team View: Gaps in the Serverless Application Attack Surface 3. Establishing a Quality Vulnerability Management Program 4. DevSecOps on the Offense: Automating Amazon Web Services Account Takeover 5. Security Precognition: Chaos Engineering in Incident Response 6. Breaking and Entering: How and Why DHS Conducts Penetration… Read More »Top 12 Talks On ‘Red Teaming & Purple Teaming’ from Security Conferences