Blog

In the News

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Office of the CISO

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Tools

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

My Journey to Becoming a Purple Teams MC

Discover the journey from penetration testing to leading Purple Teams. Learn how collaborative Purple Team exercises bridge the gap between offensive and defensive security, improve detection and response, and foster meaningful knowledge transfer.

The Entra-nce to Tenant Maturity

SRA has developed a maturity strategy for identity and access management (IAM) in Entra ID. The goal is for our clients and readers to achieve the “Modern” maturity level and aspire to be at the “Advanced” maturity level.

Limiting WMI Lateral Movement via DCOM Permissions

If you are looking for a way to curb WMI-based lateral movement – and especially if you do not want a dependency on another control, such as a firewall – DCOM permissions may prove to be a useful method that works with traditional configuration management.

Purple Team PSA: Disable Device Code Flow

Microsoft refers to device code flow as ‘high-risk’ and even “recommends blocking/restricting device code flow wherever possible”. Why? Because it might be leaving your organization vulnerable to one of the most persuasive and impactful social engineering attacks I’ve seen in my career – device code phishing.

Efficiently Managing Hundreds of Purple Teams

In 2024 Security Risk Advisors delivered over 170 Purple Teams to our clients. Supporting the technical execution of our Purple Teams we use strong project management techniques that not only make high-volume service delivery efficient but also quite manageable.

Get Off the Neverending AI Treadmill and Secure Your Organization

This blog explores why enterprises should resist the urge to chase the latest LLMs and instead focus on securing AI adoption through cloud-based platforms like Azure, AWS, and Google Cloud. Learn how strategic AI implementation can align security, IT, and innovation for long-term success.

Entra ID to the Rescue: Streamlining Identity Access Reviews with a Dash of Governance

The blog highlights the challenges of managing identity access reviews in complex environments and emphasizes the benefits of using automated tools like Microsoft’s Identity Governance to streamline these processes. Security Risk Advisors (SRA) offers custom solutions to help organizations implement and report on access review results, enhancing compliance and efficiency .

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

SiteKiosk Breakout

Enhance your HR kiosks’ defense with our Kiosk Security Review, preventing unauthorized access and ensuring robust protection against exploits.

Getting the GAL

Strengthen your security with Brute Force Defense strategies to protect remote access portals and detect single-password attacks effectively.

Beaconing Past McAfee ePO

Enhance security with Advanced Threat Simulation, testing detection against sophisticated cyber threats and toolsets.

2014 Pittsburgh Security B-Sides

We recently presented at the 2014 Pittsburgh Security B-Sides on the topic of gaining physical access to facilities. From social engineering to cloning RFID badges, we discuss ways attackers can gain access as well as ways to protect your critical physical...

LetItGo: A Case Study in Expired Domains and Azure AD

By identifying and purchasing an expired domain tied to an existing Azure AD organization, an anonymous attacker can use PowerBI or PowerAutomate to create an account and gain access to that organization’s tenant, including resources shared within that tenant (e.g., OneDrive, SharePoint, etc.). The attacker is effectively a “domain user” in that tenant. SRA created a tool called LetItGo that queries an organizations’ domain listing and returning any domains that are expired.

Understanding and Preparing for the Shift to XDR

The CyberSOC model is changing, driven by cloud adoption and improvements in detection technologies on tools like Endpoint Detection and Response (EDR). Extended Detection and Response (XDR) is the realization of these changes, putting less pressure on the SIEM to...

Malware Analysis: A General Approach

TL; DR Malware analysis has many benefits to organizations and their defenders; however, most organizations do not have processes defined for performing these actions. This post will walk through the questions that malware analysis can answer along with defining an...

SolarWinds Breach: How do we stop this from happening again?

The SolarWinds breach is perhaps one of the worst, if not the worst public hacking events in history. Much has been written on what happened, and I’m not going to regurgitate those details. There is inestimable complexity ahead for CISOs to try and identify the extent...

Getting Specific with Ransomware Preparedness

Most industry ransomware guidance is focused on SMB protections for commodity malware that exploits low-hanging fruit via worming and trashing share drives and document folders. “Have good backups” is still good advice, but there is much more we can do and with more...

Impossible Travel

As physical offices have cleared out and VPNs and remote access solutions are maxing out, many IT security departments have a sudden new challenge: how to identify an attacker with all this new noise at the border? It was hard enough finding an attacker coming into...

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Follow us on social media

Browse our Webinars

Access these virtual events on-demand and get valuable insight from our thought leaders and subject matter experts.

Get Curated Security News and Critical Vulnerability Reports

Our Threat Intelligence Gathering & Research (TIGR) team is focused on threat intelligence and curates a daily intelligence report, TIGR Threat Watch, with information collected from several industry intel sources. We also create and publish ad-hoc critical vulnerability notifications in case of critical and time-sensitive vulnerabilities or threats.