Attending Black Hat USA this year? Visit us in booth #1747 and begin to realize more value out of your existing security tools.

ReliaQuest

Author's Posts

ReliaQuest at Black Hat 2021

One of the largest cybersecurity conferences is fast approaching and ReliaQuest will be there. Black Hat 2021 is back in person this July 31st – August 5th and ReliaQuest is proud to be a Platinum Sponsor. As we return to in-person events, the following is a Who, What, Where and When for all things ReliaQuest at Black Hat 2021. We are looking forward to seeing you there – or in our virtual booth.    If you’re headed to Black Hat and would like […]

Hurricane Elsa Readiness and Response

As many of you know, a hurricane warning was issued for parts of Florida’s West Coast which includes the Tampa Bay Area. As many of our customers are aware, hurricane readiness is nothing new to ReliaQuest. We have activated our response plans to ensure availability of the ReliaQuest GreyMatter cloud-native platform and continuity of our […]

Top 3 Mistakes When Simulating Cyber Attacks

Breach and attack simulation (BAS) offers an efficient way to validate and test security controls, threat detection capabilities, logging levels in an environment, and incident response workflows. Simulating cyber attacks in this manner allows for security teams to proactively identify and remediate gaps; however, if not performed correctly, security teams may end up with a […]

How to Get the Most out of Your Security Monitoring with the Cyber Kill Chain Model

Updated June 2021 In our personal lives, many of us try to get the most out of a tank of gasoline – waiting until the red indicator shines bright and we finally have to stop at a gas station to fill our tank. This mindset extends to many aspects of our lives, both personally and […]

Credential Dumping Part 2: How to Mitigate Windows Credential Stealing

Credential theft is part of almost all attacks within a network, and one of the most widely known forms of credential stealing is surrounding clear-text credentials by accessing lsass.exe. However, this is only a piece of the bigger picture of the Windows credential model.  In Part 1 of the Credential Dumping Series, I took a closer look […]

Credential Dumping Part 1: A Closer Look at Vulnerabilities with Windows Authentication and Credential Management

For many of us in cybersecurity, we know that credential theft is part of almost all attacks within a network. Arguably, one of the most known forms of credential stealing is surrounding clear-text credentials by accessing lsass.exe. Almost synonymous with credential stealing is the popular tool Mimikatz, which is able to access the LSASS (Local Security Authority Subsystem […]

A Defense Approach to Mitigating Phishing Attacks

Purpose-built security tools are designed to solve for the ever-evolving threat landscape led by APTs, Nation-States, and Hacktivists, but is your organization accounting for the internal threats posed by your authorized users? Most phishing attacks require help from the end user to be successful Source: Peter Broelman The latest Verizon Annual Data Breach Investigations Report […]