Cybersecurity
Introducing Goffloader: A Pure Go Implementation of an In-Memory COFFLoader and PE Loader
We are excited to announce the release of Goffloader, a pure Go implementation of an in-memory COFFLoader and PE loader. This tool is designed to facilitate the easy execution of Cobalt Strike ...
Demystifying SOC 2 Compliance for Startups: A Simple Guide
Navigating the world of SOC 2 compliance can seem daunting for startups. This article breaks down the complexities, explaining what SOC 2 is, why it's important, and how your startup can achieve ...
Data Breaches for the Month August 2024
This month has been a challenging month for organizations worldwide as several high-profile data breaches occur and become headlines. These incidents have not only exposed sensitive information but also highlighted... The post ...
DevOpsDays Birmingham AL 2024: Guardrails, Immutable Infrastructures, and Community
Explore highlights from DevOpsDays Birmingham 2024, featuring workshops, sessions, and community-driven discussions on empowering teams and doing it securely ...
How to Stay One Step Ahead of Data Breaches and Master Cloud Threat Detection
Implementing a cloud threat detection system enhances your team's ability to maintain a strong security posture without significant overhead ...
Telegram is NOT an Encrypted Messaging App, Must-See Documentaries
In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is ...
4 Tips for Optimizing Your GRC Strategy
Why GRC strategies are often not as effective as they could be, and specific practices businesses can adopt to improve GRC operations ...
Modern Strategies for IoT Device Fingerprinting
The widespread adoption of IoT devices has created new cybersecurity challenges, including those related to external attack surface management ...
Missing Guardrails, a Troubling Trend in Data Protection
An estimated 2.7 billion personal records were stolen from National Public Data (NPD), a Florida-based data broker company that collects and sells personal data for background checks ...
ASPM and Modern Application Security
Gartner's 2024 Hype Cycle for Application Security: ASPM moves from peak to trough ...