cybersecurity

Colonial Pipeline Attack: Getting to the Root Cause

A recent article provides an excellent analysis of the Colonial Pipeline ransomware attack. Underlying the analysis is that, absent the use of public-key infrastructure (PKI), none of these attacks would have happened. More worrisome is that virtually every recently breached entity (and virtually every enterprise [...]

Colonial Pipeline Attack: Getting to the Root Cause2022-04-28T14:15:06+00:00

Applying KISS + the MITRE ATT&CK Framework to Cybersecurity

The MITRE ATT&CK Framework is an excellent resource for understanding how bad-guy TTP’s (tactics, techniques and procedures) can be used to get inside your network. The Framework enables an after-action analysis of an attack. However, some argue that recent cyberattacks were all but inevitable. So, [...]

Applying KISS + the MITRE ATT&CK Framework to Cybersecurity2022-04-28T14:52:33+00:00
Go to Top