Most recent

How SDP Would Have Prevented the Citrix Hack

You’re probably at least a bit familiar with Citrix, the software giant responsible for desktop virtualization, networking and SaaS services that are in use at millions of companies around the world. It is used by Fortune 500 organizations, the US Military and many government agencies  It is a central element of how many businesses conduct their operations today.

Read More
16 Apr 2019

Building Zero Trust With a Software Defined Perimeter

Back in 2010, John Kindervag, the then-principal analyst at Forrester, coined the term Zero Trust. The idea behind this edgy-sounding concept was that when it comes to network security, nothing can be trusted and everything — and everyone — should be verified.

Read More
14 Jan 2019

US Ballistic Missile Agency Fails Security Audit

We’ve spoken before about how difficult it is to secure important information at the level of individual US states. What about the U.S. military?

Read More
10 Jan 2019

Red Team 201: Your First Test

Over the last few weeks, Safe-T has provided a basic introduction to the tools and operating systems that you’ll use as a member or leader of a red team. Now, let’s contextualize them – how would you use these tools in the context of an actual security exercise?

Read More
02 Jan 2019

It's Time to Replace SMB with Something Smarter

Original network protocols are starting to age out of usefulness. HTTP is being replaced by HTTPS, people are trying to replace DNS with DNSSEC, and TLS just got its first update in 8 years. Now it's time to update SMB. Introducing SmarTransfer.

Read More
26 Dec 2018

Creating A Secure Data Workflow With SDE

What does it look like when you secure a file with Safe-T? We talk a lot about creating granular access controls and integrating with your existing security structure, but it may just be easier to put the whole journey in context. Starting with an email and an attachment, here's how Safe-T’s Secure Data Exchange solution takes care of a file – and its accompanying text – in order to keep it safe, auditable, and easy to use. 

Read More
19 Dec 2018

What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?

For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and high-priority internal network segments use SMB to provide access to remote users. Although SMB is convenient for Windows and other networks, it’s also convenient for attackers.

Read More
17 Dec 2018

Red Team 104: CrackMapExec

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing.

Read More
06 Dec 2018

Red Team 103: Understanding Sqlmap

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing.

Read More
28 Nov 2018


Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!