Most recent

It's Time to Replace SMB with Something Smarter

Original network protocols are starting to age out of usefulness. HTTP is being replaced by HTTPS, people are trying to replace DNS with DNSSEC, and TLS just got its first update in 8 years. Now it's time to update SMB. It's time for Safe-T Secure File Access.

Read More
22 Dec 2019

4 DMZ Best Practices to Shield You From Attackers

In the cloud era, the DMZ has become more important – and more vulnerable – than its original architects ever thought possible. 

Read More
10 Nov 2019

ZoneZero™ can Prevent Further Lateral Movement Within Compromised Organizations.

VPNs have been a cornerstone of secure networking for the last 20+ year. They provide employees and third parties with secure remote access to corporate networks and services. However, as technology evolves, most VPNs lack the ability to enforce the narrow, granular permissions that enterprises require.

Read More
29 Aug 2019

Red Team 201: Your First Test

Over the last few weeks, Safe-T has provided a basic introduction to the tools and operating systems that you’ll use as a member or leader of a red team. Now, let’s contextualize them – how would you use these tools in the context of an actual security exercise?

Read More
02 Jan 2019

What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3?

For a certain kind of secure communication, Server Message Block (SMB) is no longer suited for the task. Windows machines use SMB to pass files around a network. Printers, mail servers, and high-priority internal network segments use SMB to provide access to remote users. Although SMB is convenient for Windows and other networks, it’s also convenient for attackers.

Read More
17 Dec 2018

Red Team 104: CrackMapExec

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing.

Read More
06 Dec 2018

Red Team 103: Understanding Sqlmap

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing.

Read More
28 Nov 2018

Red Team 101: Understanding Kali Linux

Your security environment is complicated. You’re invested in multiple security tools – antivirus, firewalls, IDS, IPS, SIEM, DLP, and more. If you haven’t invested in a red team, however, you’re doing security wrong.  How could you know that your expensive defenses are working unless you’ve tested them out?

Read More
14 Nov 2018

Managing the Intersection of Cryptocurrency and Compliance

Cryptocurrency startups are still all the rage these days, but many of these companies have had a "break rules first, settle lawsuits later" approach to operating.

Read More
08 Nov 2018