Most recent

Building Zero Trust With a Software Defined Perimeter

Back in 2010, John Kindervag, the then-principal analyst at Forrester, coined the term Zero Trust. The idea behind this edgy-sounding concept was that when it comes to network security, nothing can be trusted and everything — and everyone — should be verified.

Read More
14 Aug 2019

US Ballistic Missile Agency Fails Security Audit

We’ve spoken before about how difficult it is to secure important information at the level of individual US states. What about the U.S. military?

Read More
10 Jan 2019

Red Team 201: Your First Test

Over the last few weeks, Safe-T has provided a basic introduction to the tools and operating systems that you’ll use as a member or leader of a red team. Now, let’s contextualize them – how would you use these tools in the context of an actual security exercise?

Read More
02 Jan 2019

Red Team 103: Understanding Sqlmap

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing.

Read More
28 Nov 2018

130 Million Hotel Customers Breached Due to Exposed Database

Over the last few months, there’s been another massive security breach, one that you potentially haven’t heard of. Its scale was nearly as large as that of Equifax, with 130 million consumers affected.

Read More
25 Sep 2018

How to Protect Your SMB Clients from Ransomware

No company is too small to be devastated by a ransomware attack. In fact, small and medium-sized businesses (SMBs) are prime targets, and the number--and cost--of such attacks continues to rise.

Read More
17 Sep 2018

You Can’t Fix Authentication Without Fixing Access

Think of the last time you logged into your network. Let’s assume that you used a traditional VPN, with a traditional IAM scheme underneath. This isn’t a bad assumption, because 25% of all internet traffic goes over a VPN. 

Read More
26 Jul 2018

Use Redis? There's a Good Chance It's Been Co-Opted

Open source databases may have a problem. For the second time in just three years, a popular open-source database has become infected, on a massive scale, with cryptocurrency-related malware. In late 2016, the vector of the infection was MongoDB, and the source of the infection was ransomware.

Read More
08 Jul 2018

Data Breach Rundown: Year by Year

Another year has gone by – another year that seems to have been a single all-consuming cyber-disaster. 2017 has been so bad for information security that it’s hard to even visualize separate security incidents. 

Read More
10 Jan 2018


Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!

Contact Us: