By Luke WilladsenBLUF: This blog series is written to provide an anecdotal history of the evolution of exploitation in cybersecurity, focused largely on network exploitations in an enterprise and couched as Luke’s perspective over his decade-long career in InfoSec.
In cybersecurity, we preach the importance of layered security. And being successful in implementing a layered security strategy is a matter of staying in tune with the white hat community. A layered security strategy means you need to block high, and block low. You need your endpoint security and your intrusion detection systems (IDS), and you need to protect yourself from the low-tech abuse of misconfigurations, poor patching practices, and weak passwords. By Hunter DonahueFor start-ups, small businesses, and large, multi-national organizations alike, differentiating your products and services from those of your competitors and driving home your competitive advantage to customers is crucial to success. More often than not, businesses look to promote their latest and greatest in capabilities and features when attempting to establish their competitive advantage with consumers. Yet in a time when consumer behavior is changing, the uncertainty around what can be trusted online is at an all-time high, and shoppers are constantly inundated with targeted adverts, finding or maintaining your edge in the marketplace requires new and different strategies and messages.
By Luke WilladsenBLUF: This blog series is written to provide an anecdotal history of the evolution of exploitation in cybersecurity, focused largely on network exploitations in an enterprise and couched as Luke’s perspective over his decade-long career in InfoSec.
In the field of cybersecurity, there’s one constant: It’s a game of cat-and-mouse. As exploits and vulnerabilities evolve, so too do vendors and defenders. While the first half of the 2010s are remembered by excessive buffer overflow attacks and the rise in the use of PowerShell-based remote execution techniques, the remainder of the decade featured new and “improved” ways to perform network exploitation. |