Most recent

US Ballistic Missile Agency Fails Security Audit

We’ve spoken before about how difficult it is to secure important information at the level of individual US states. What about the U.S. military?

Read More
10 Jan 2019

Red Team 104: CrackMapExec

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing.

Read More
06 Dec 2018

Red Team 103: Understanding Sqlmap

Welcome back to our series on red teams! Here, we’re explaining the tools and concepts behind the in-house organizations designed to test a company’s defenses. We started by introducing Kali Linux, a foundational operating system for penetration testing.

Read More
28 Nov 2018

Red Team 101: Understanding Kali Linux

Your security environment is complicated. You’re invested in multiple security tools – antivirus, firewalls, IDS, IPS, SIEM, DLP, and more. If you haven’t invested in a red team, however, you’re doing security wrong.  How could you know that your expensive defenses are working unless you’ve tested them out?

Read More
14 Nov 2018

Managing the Intersection of Cryptocurrency and Compliance

Cryptocurrency startups are still all the rage these days, but many of these companies have had a "break rules first, settle lawsuits later" approach to operating.

Read More
08 Nov 2018

Bug Spells Doom for Nearly-Vacant Google+ Network

Did you ever have a Google Plus account? Neither did we, but a few people did, and most of their information just got leaked in a bug that affected 500,000 people. As a result, the search giant has shut their social media experiment down. Gone doesn’t mean forgotten however, and it turns out that even though Google Plus has been deleted, Google itself has been facing scrutiny about what led to the bug that finally killed it.

Read More
23 Oct 2018

2018 Will Be an Interesting Year for Information Security – Here’s How Safe-T Can Help

As of this writing, we’re just a month into 2018, and it’s already looking like an interesting year in the realm of information security. Here, interesting means fraught. The first few days of the year ushered in devastating news in the form of the Specter and Meltdown vulnerabilities. 

Read More
01 Feb 2018

3 Risky Scenarios of Online Application Sharing

File upload is one of those can’t-live-with-it, can’t-live-without-it items that makes information security so fraught with difficulty. On the one hand, it automates parts of doing business – especially B2C business – that would typically require a person to make a phone call, send an email, or even dust off their fax machine.

Read More
26 Dec 2017

4 Tips for Data Governance Mastery

Your company probably has data that exists within internal systems (CRM, ERP, etc) as well as external systems that are outside of your control (i.e. weather, social media, etc.). If this disparate data leads you to question the quality of your data, you’re not alone.

Read More
27 Jun 2017


Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!

Contact Us: