Securing Linux Against Negligent or Malicious Administrators
By Willis McDonald & Vincas Čižiūnas on Apr 22, 2020 9:27:28 AM
Insider Threat: Reducing Gaps and Increasing Visibility for a Remote Workforce
By Bryan Clements & Chris DiSalle on Apr 10, 2020 2:26:46 PM
While the rapid shift from office to home or remote-based activity has allowed work to continue, the idea that corporate assets are physically leaving the corporate space, and with them access to proprietary or sensitive data, could be a disaster if your security policies and practices are not adapting to this new norm. Now more than ever, companies need to be evaluating information technology and security practices surrounding insider threats.
Compromise Assessments: For Remote Workforce
By Chris DiSalle & Travis Peska on Apr 1, 2020 1:16:58 PM
Many information technology and security professionals are starting to adjust to the “new normal” of administering a remote workforce and subsequently monitoring for malicious activity of the increased attack surface.
Deep Fakes
By Rob Volkert on Apr 1, 2020 12:49:52 PM
This paper examines the illicit ecosystem for deep fakes.
Their technology evolution and migration paths from surface web to deep and dark sites, and uncover some of the actors creating and disseminating these videos. Nisos undertook research into deep fake technology (superimposing video footage of a face onto a source head and body) to determine if we could find the existence of a deep fake illicit digital underground economy or actors offering these services.
Purple With a Purpose
By Nisos on Feb 16, 2020 8:47:00 PM
A true return on investment for network security
1 min read
Fake News Websites and a US-Macedonia Partnership
By Cindy Otis on Dec 1, 2019 8:54:00 PM
Fake News Websites and a US-Macedonia Partnership: A Fake News Case Study examines the fake news industry and specific attempts from bad actors to influence opinions.