Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Having a Conversation about the Convergence of Cybersecurity and IT Operations in a Modern Threat Landscape.

In November 2024 I attended Tanium’s Convergence Conference in Orlando, FL. The conference was focused on a topic which I feel has been, somewhat, ignored in the past. This is the topic of how to combine forces between IT and Cybersecurity. Now, the common thought process on this is that you shouldn’t combine these two as it has the risk of becoming a situation where the fox is watching the hens. Sadly, there is truth to this reservation regarding the combination of these two teams. However, there is a way to combine the operations functions of these two teams while keeping them distinct. Shortly after Tanium Converge, I spoke with Dane Thomas at JLL (A global Real Estate services company) on one way to approach this.

Details
By Sean Kalinich
Sean Kalinich
Feb 04
Hits: 549

Read more: Having a Conversation about the Convergence of...

No comments on “Having a Conversation about the Convergence of Cybersecurity and IT Operations in a Modern Threat Landscape.”
Security Talk

If the Front Door Can’t Keep Attackers Out, Maybe Putting Locks on Every Inside Door Can Help. We Talk to Elisity About One Way to Do This.

Black Hat 2024 – Las Vegas

In infrastructure design there used to be a philosophy of putting components in silos (segmenting them). This was not really done for security, but more to limit impacts across an organization or environment. The use of different subnets, ACLs, routers, and firewalls was just part of how you built things. This philosophy seems to have died out as environments became more physically disbursed and technologically complex. With the advent of OT and IoT devices being able to access everything without the need to physically visit a site or needing to connect to a different system which then connected to another control plane was just not something that modern businesses would tolerate. Networks got flatter and, sadly, in some cases restrictions and controls for accessing sensitive devices disappeared. Now far too many organizations (especially Hospitals and Infrastructure) need that segmentation but cannot afford the time needed to rebuild their entire networks with this in mind.

Details
By Sean Kalinich
Sean Kalinich
Sep 03
Hits: 2965

Read more: If the Front Door Can’t Keep Attackers Out,...

No comments on “If the Front Door Can’t Keep Attackers Out, Maybe Putting Locks on Every Inside Door Can Help. We Talk to Elisity About One Way to Do This.”
Security Talk

Breaking Into the VPN is Just the Tip of the Iceberg According to Akamai Research

Black Hat 2024, Las Vegas, NV

(Scene Black and White view of a frazzled IT/cybersecurity engineer looking at a box on a cluttered desk. Campy after school special music is playing)
Narrator – So you finally bought an Enterprise Class Virtual Private Network appliance?

Frazzled Engineer Looks up and nods slowly

Narrator – Great! Do you have your ACLs for network segmentation, secure access to your IAM systems, internal account lock down policies, geo-fencing plan, device recognition design, certificate governance, Multi-factor….. voice trails off

Frazzled Engineer slowly starts to bang his head on the table.

Details
By Sean Kalinich
Sean Kalinich
Aug 20
Hits: 1306

Read more: Breaking Into the VPN is Just the Tip of the...

No comments on “Breaking Into the VPN is Just the Tip of the Iceberg According to Akamai Research”
Security Talk

Tines Talks to Us About Automation as a Fundamental Part of Cybersecurity

Black Hat 2024, Las Vegas, NV

There is an old, sarcastic, adage which says, why do something right now that you can spend hours automating. This is usually applied to development, IT, and cybersecurity tasks which are repetitive and dull. However, what if it didn’t take hours to automate those tasks, what if you could quickly and efficiently build automation workflows for the dull drudge work for your IT and cybersecurity teams enabling them to spend their time more effectively on bigger issues? Well, I talked with Eoin Hinchy, CEO and co-founder of Tines about this very topic.

Details
By Sean Kalinich
Sean Kalinich
Aug 20
Hits: 1336

Read more: Tines Talks to Us About Automation as a...

No comments on “Tines Talks to Us About Automation as a Fundamental Part of Cybersecurity”
Security Talk

Are Modern Web Browsers a Blind Spot on the Threat Landscape? We talked to SquareX About It.

DEF CON 32 Las Vegas, NV.

To most people a Web Browser is just an application that show them the sites they visit either via a typed in URL or a link clicked from somewhere. What they often fail to realize is that behind that display is quite a bit of code execution and rendering to product the visuals which we consume. Threat Actors and other malicious individuals have known about this for years and take advantage of the automated code and script execution during the rendering phase of a website for different types of attacks. The cybersecurity industry is also very aware of this and has developed many (man) tools and techniques to limit potential attacks via the browser.

Details
By Sean Kalinich
Sean Kalinich
Aug 19
Hits: 2340

Read more: Are Modern Web Browsers a Blind Spot on the...

No comments on “Are Modern Web Browsers a Blind Spot on the Threat Landscape? We talked to SquareX About It.”

More Articles …

  1. Fear and Ignorance in Las Vegas, how FUD has Directly Impacted DEF CON 32 Attendees
  2. Phishing Judo Arrives as Guardio Labs Unveils EchoSpoofing Exploit used against ProofPoint
  3. CrowdStrike’s Thursday Goof Creates Chaos with Systems and Social Media
  4. So, you started your own business --what next? Well time to think about security.
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

Page 1 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech