Blog

In the News

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Office of the CISO

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Tools

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Introducing Tier 0: How AI Is Empowering the Agentive SOC

Discover how Tier 0, powered by SCALR AI, is transforming Security Operations Centers. By automating repetitive tasks and enriching alerts, Tier 0 enables analysts to focus on real threats, creating a smarter, more sustainable SOC. Learn more about this innovative approach.

Sharpening Offensive Skills Through Purple Teams

Discover how purple teams bridge the gap between red and blue teams, offering red teamers real-time feedback, hands-on experience with defensive tools, and insights into enterprise environments. Learn how this collaborative approach sharpens offensive skills and enhances detection strategies.

What is OT?

There are many ways to think about Operational Technology (OT) aside from the official definition. I challenge you to define what “OT” is to your organization, and its alignment to your business.

Understanding and Preparing for the Shift to XDR

The CyberSOC model is changing, driven by cloud adoption and improvements in detection technologies on tools like Endpoint Detection and Response (EDR). Extended Detection and Response (XDR) is the realization of these changes, putting less pressure on the SIEM to...

Building a Security Strategy the Right Way

Given the wildly unexpected events of 2020 and their potential lasting impact that could change the way we work, CISOs should consider revisiting their existing strategies now or begin to plan new ones for 2021 and beyond. At Security Risk Advisors, we often field...

SolarWinds Breach: How do we stop this from happening again?

The SolarWinds breach is perhaps one of the worst, if not the worst public hacking events in history. Much has been written on what happened, and I’m not going to regurgitate those details. There is inestimable complexity ahead for CISOs to try and identify the extent...

Getting Specific with Ransomware Preparedness

Most industry ransomware guidance is focused on SMB protections for commodity malware that exploits low-hanging fruit via worming and trashing share drives and document folders. “Have good backups” is still good advice, but there is much more we can do and with more...

MSSpray: Wait, how many endpoints DON’T have MFA??

A Little Backstory As more companies move their infrastructure into the cloud, attackers are adapting their techniques to target these resources. One of the bigger changes is the shift to using Azure Active Directory (Azure AD) rather than an on-site solution. We’ll...

Direct Access Memories: Subverting FDE with DMA Attacks

Tl;dr: By expanding on research, we were able to successfully gain full administrative access on a sample of laptops from corporate environments with Full Disk Encryption enabled in less than 10 minutes.   Background Full Disk Encryption (FDE) has traditionally...

AWS IAM Exploitation

In AWS, authorization is governed by the Identity and Access Management (IAM) service. Unfortunately, as most software configuration goes, there is ample opportunity for misconfigurations that result in security vulnerabilities. As it pertains to AWS IAM, this...

Enhancing Cloud Security with Purple Team Strategies

Enhance your cloud security with Purple Teaming strategies. Learn how to validate security controls, track improvements, and detect threats in Azure, AWS, and on-prem environments using VECTR. Discover real-world test cases, resilience metrics, and best practices to strengthen your security posture.

My Journey to Becoming a Purple Teams MC

Discover the journey from penetration testing to leading Purple Teams. Learn how collaborative Purple Team exercises bridge the gap between offensive and defensive security, improve detection and response, and foster meaningful knowledge transfer.

Purple Team PSA: Disable Device Code Flow

Microsoft refers to device code flow as ‘high-risk’ and even “recommends blocking/restricting device code flow wherever possible”. Why? Because it might be leaving your organization vulnerable to one of the most persuasive and impactful social engineering attacks I’ve seen in my career – device code phishing.

Efficiently Managing Hundreds of Purple Teams

In 2024 Security Risk Advisors delivered over 170 Purple Teams to our clients. Supporting the technical execution of our Purple Teams we use strong project management techniques that not only make high-volume service delivery efficient but also quite manageable.

VECTR for DORA TLPT Documentation

DORA-TLPT (Threat-Led Penetration Testing) requirements go live in January 2025! With TLPT frameworks like TIBER-EU and UK-CBEST, these assessments involve structured, high-stakes Red Team exercises. VECTR™ enhances compliance efforts by supporting Intel and Red Team phases, documenting TTPs, and visualizing threat data in a structured way. Explore how VECTR™ can streamline TLPT engagements and strengthen your organization’s resilience.

Market Maker Public Release

As part of our purple teams program here at SRA, we develop many different threat simulation plans (“bundles”), such as our Threat Simulation Indexes. To support the creation of these bundles, we developed the “Market Maker” (“MM”) suite of tools. Market Maker is a Python library, collection of command-line scripts, and several extensions.

Malware Analysis: A General Approach

TL; DR Malware analysis has many benefits to organizations and their defenders; however, most organizations do not have processes defined for performing these actions. This post will walk through the questions that malware analysis can answer along with defining an...

One-Click Threat Hunting with Security Copilot

Do you ever feel like you suffer from prompt anxiety? It’s like social anxiety but instead you replace the social part with an AI chat bot. You feel that pressure of having to come up with the perfect prompt to make sure you get just the right response. The way I deal...

Using Purview and M365 to Mitigate Data Security Risks in Microsoft Teams Meeting Recordings

Recording Teams meetings is a convenient way to memorialize an important discussion. But without proper controls in place, recordings can capture sensitive information, consume valuable cloud storage space, and become a data loss vector. Make sure your organization has configured the right settings to mitigate these risks and learn how to use Purview to understand if the organization is already oversharing.    

Introducing Epic Monitoring for SCALR XDR: Elevating Healthcare Security

Electronic Medical Records (EMR) solutions contain a healthcare organization’s most critical and sensitive patient data. However, these EMR systems are rarely monitored, and there is often no regular review of the system for security events. This puts the most important data source in your organization at risk and can potentially lead to data breaches, unauthorized access, and other security incidents that could compromise patient privacy and the integrity of the medical records. Healthcare companies using SCALR XDR as their CyberSOC can now including monitoring of their Epic EMR as part of their 24×7 monitoring service.

An Overview of Deputies in AWS

In an AWS customer account, resources like virtual machines and databases are typically created by user principals tied to that customer, such as a developer role or IAM user. In some circumstances however, AWS itself will create/interact with resources in a...

Microsoft Purview: You Get Out What You Put In

Microsoft’s recently rebranded Purview suite of data governance, security, and compliance solutions offers more capabilities than ever before within a single product. But without a fundamental understanding of your data, getting value out of these tools remains a challenge. Defining your organization’s critical data and objectives for protecting it is a critical first step in maximizing the value of any Purview deployment.

CISO Guidance for AI Security

AI introduces both risks and opportunities for businesses, and organizations should be prepared to protect their AI technology at the same level they protect traditional “crown jewel” or other sensitive data. Senior leadership will look to CISOs for guidance both on how to protect AI and how to use it to enhance the security of their organizations. What follows is some guidance on how a CISO might proceed as AI technology evolves and is deployed.

Open Letter to the FDA

This blog post contains a copy of the questions and comments we’ve submitted to the FDA regarding their latest Medical Device Cyber Security Pre-Market Guidance draft (Link Here).  In our previous blog post, we provided an overview of the draft.  We believe that...

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Follow us on social media

Browse our Webinars

Access these virtual events on-demand and get valuable insight from our thought leaders and subject matter experts.

Get Curated Security News and Critical Vulnerability Reports

Our Threat Intelligence Gathering & Research (TIGR) team is focused on threat intelligence and curates a daily intelligence report, TIGR Threat Watch, with information collected from several industry intel sources. We also create and publish ad-hoc critical vulnerability notifications in case of critical and time-sensitive vulnerabilities or threats.