We spoke to Chief Technology Officer, Stefan Dumitrascu
For this month’s employee spotlight piece, we spoke to Chief Technology Officer, Stefan Dumitrascu.
Continue reading “Employee Spotlight – Stefan Dumitrascu”For this month’s employee spotlight piece, we spoke to Chief Technology Officer, Stefan Dumitrascu.
Continue reading “Employee Spotlight – Stefan Dumitrascu”Multi-Factor Authentication (MFA) is much more popular than it used to be. It’s easy to use and the enhanced security that it provides is supported by many services. But it’s not bulletproof. It is possible to bypass Multi-Factor Authentication.
The proliferation of mobile devices that support MFA in various different ways has helped make it a convenient option for users and life much harder for attackers, who need to develop ways to get around it. So, of course, they do.
In this report we examine how attackers manage to bypass Multi-Factor Authentication, a security measure that seems rock solid on the face of it.
Continue reading “3 ways attackers bypass Multi-Factor Authentication”For this month’s employee spotlight piece, we spoke to Senior Security Analyst, Dimitrios Tsarouchas.
Continue reading “Employee Spotlight – Dimitrios Tsarouchas”How can you test and judge endpoint protection products? SE Labs tested a variety of Endpoint Detection and Response products against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.
An Endpoint Detection and Response (EDR) product is more than anti-virus, which is why it requires advanced testing. This means testers must behave like real attackers, following every step of an attack.
Continue reading “Endpoint Detection Compared”For this month’s employee spotlight piece, we spoke to ESS Project Lead and heavy metal enthusiast, Joseph Pike.
Continue reading “Employee Spotlight – Joseph Pike”SE Labs tested Coronet Cyber Security Coro against a range of hacking attacks designed to compromise systems and penetrate target networks in the same way as criminals and other attackers breach systems and networks.
There are many opportunities to spot and stop attackers. Products can detect them when attackers send phishing emails to targets. Or later, when other emails contain links to malicious code. Some kick into action when malware enters the system. Others sit up and notice when the attackers exhibit bad behaviour on the network.
Continue reading “Early protection systems”New episodes on the last Wednesday of the month.
Find all of the episodes from the award-winning Cyber Security DE:CODED podcast in one handy place.
Find all of the episodes from Cyber Security DE:CODED Series Two here. Use the Subscribe links above to connect our podcast with your favourite podcast platform and ensure you get the next episodes before anyone else.
What is the attack chain? Why is it good to test using full attack chains? And what are some of the alternative approaches, with their pros and cons? We’ll try to answer all of these questions and more in this special presentation episode recorded at the AVAR conference in Singapore in December 2022.
Continue reading “Cyber Security DE:CODED – Full attack chain testing”If we’ve given the impression that we’re at the heart of the security world, working with the organisations that spend billions on security – and with the companies that make billions by selling security products – you’d be right. And that puts us in an awkward position. Because we want to make security better for everyone. And sometimes that means speaking some uncomfortable truths.
This episode is the uncomfortable truth episode.
Continue reading “Cyber Security DE:CODED – Cheating in security testing”Small business and Managed Service Provider special!
In June 2022*, we set up a panel of security experts to help and advise companies selling managed security services. Managed Service Providers (MSPs) need to choose a set of security solutions that they can use or possibly resell to their small business clients, known as SMBs.
The clients face the same cyber threats as large organisations, but they’re far less equipped to handle them.
We answer all of these questions and more with special guests Martin Lee from Cisco, Chad Skipper from VMware, and Luis Corrons from Avast.
Security Life Hack from John Hawes (AMTSO)!
Continue reading “Cyber Security DE:CODED – Security opportunities for Managed Service Providers”Give us a few details about yourself and describe your inquiry. We will get back to you as soon as possible.