Whitepaper

Cracking the August SmartLock: WiFi Password Eavesdropping Made Easy

Foreword The rise of online property rental in an increasingly competitive sharing economy has had a significant impact on the adoption of Internet-connected smart locks. Packed with features that allow landlords to issue and revoke access by electronically sharing a token or PIN code during booking, smart locks have managed to eliminate the need to […]

Cracking the August SmartLock: WiFi Password Eavesdropping Made Easy Read More »

2020 CrowdStrike APJ State of Cybersecurity Survey

INTRODUCTION The first half of 2020 brought unprecedented disruption, change and the need for adaptation to businesses and organizations across the world. While leaders have moved to identify and confront a slew of challenges, cybersecurity adversaries have acted just as quickly to take advantage of uncertainty and changing dynamics. Sharing knowledge, experiences and insights has

2020 CrowdStrike APJ State of Cybersecurity Survey Read More »

An Introduction to Zero Trust

A Compelling Cybersecurity Strategy for Defending the Enterprise It’s a cloud-first world. Your users now regularly connect directly to cloud-based applications and web destinations from any device anywhere. Sophisticated cyberthreats use those connections to penetrate your traditional network perimeter. Against this backdrop, enterprises and government organizations are turning to Zero Trust architectures to protect their

An Introduction to Zero Trust Read More »

What is Lurking on Your Network

Exposing the threat of shadow devices Most internet communications rely on DNS, although it is often not sufficiently secured, which creates vulnerabilities that can be exploited for data exfiltration and spreading malware. Over 91 percent of malware uses DNS to communicate with C&C servers, lock up data for ransom or exfiltrate data. Existing security controls,

What is Lurking on Your Network Read More »

Software-defined DDI

Fully realise the value of SD-WAN for remote locations and branch offices Businesses that are undergoing digital transformation and transitioning to cloud-based services are increasingly choosing software-defined solutions. Virtual form factor, cloud-based management and large-scale automation form the crux of software-defined solutions. BloxOne DDI is the industry’s first software-defined DDI solution. It enables remote sites

Software-defined DDI Read More »

The Five Pillars of Customer Identity and Access Management

Customer Identity and Access Management (CIAM), a subgenre of IAM, enables organizations to scale and ensure secure, seamless digital experiences for their customers, while collecting and managing customer identity data purposefully. Powerful CIAM solutions provide a variety of key features including customer registration, social logins, account verification, self-service account management, consent and preference management, single

The Five Pillars of Customer Identity and Access Management Read More »

StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure

Overview StrongPity, also known as Promethium, is a threat group that is assumed to have been active since at least 2012. Information about this actor was first publicly reported in October 2016 with details on attacks against users in Belgium and Italy. Later, in 2018, the attackers shifted their focus on another geographical region, compromising

StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure Read More »

How to Map MITRE ATT&CK Techniques: Bridging the Gap between Theory and Implementation

MITRE ATT&CK and ThreatQ The MITRE ATT&CK framework contains a tremendous amount of data that can prove valuable in a range of use cases, including spearphishing, threat hunting, incident response, vulnerability management and alert triage. To make the information contained within the MITRE ATT&CK framework actionable for these use cases, ThreatQuotient integrates components of the

How to Map MITRE ATT&CK Techniques: Bridging the Gap between Theory and Implementation Read More »

The convergence of analytics, data science and process automation

DIGITAL TRANSFORMATION WHAT DRIVES SUCCESS In a recent McKinsey global survey on digital transformation, eight out of every 10 respondents said their organizations have embarked on a digital transformation journey in the last five years. That’s promising news. However, only one third of these initiatives have succeeded. For such organizations the digital transformation journey remains

The convergence of analytics, data science and process automation Read More »