Attending Black Hat USA this year? Visit us in booth #1747 and begin to realize more value out of your existing security tools.


Author's Posts

What Is Managed Detection and Response (MDR)?

Managed detection and response (MDR) is an outsourced approach to cybersecurity where third parties handle threat monitoring, detection, and response. Specifically, the MDR model pairs real-time monitoring and detection of ransomware, malware, and other security intrusions with rapid incident response to address and eliminate the threats. Key Characteristics That Define MDR The most important components […]

What Is Phishing?

Phishing is the practice of stealing credentials by masking malicious intent behind the appearance of something innocuous. An email that looks like it’s from a social network asking you to reset your password is one of the most common versions. Once a user submits their credentials, attackers then use the victim’s account to spread the […]

ReliaQuest’s Experts Weigh In: 2021 Cybersecurity Predictions

This past year has certainly thrown some curveballs at security professionals.  With new threats tied to current events like the COVID-19 pandemic and the United States presidential election, organizations have had to re-evaluate their security strategies and shift priorities, and this new focus will undoubtedly carry into the new year.  Perhaps the greatest reveal that […]

Credential Dumping Part 2: How to Mitigate Windows Credential Stealing

Credential theft is part of almost all attacks within a network, and one of the most widely known forms of credential stealing is surrounding clear-text credentials by accessing lsass.exe. However, this is only a piece of the bigger picture of the Windows credential model.  In Part 1 of the Credential Dumping Series, I took a closer look […]

Credential Dumping Part 1: A Closer Look at Vulnerabilities with Windows Authentication and Credential Management

For many of us in cybersecurity, we know that credential theft is part of almost all attacks within a network. Arguably, one of the most known forms of credential stealing is surrounding clear-text credentials by accessing lsass.exe. Almost synonymous with credential stealing is the popular tool Mimikatz, which is able to access the LSASS (Local Security Authority Subsystem […]

CISOs, Are You Prepared to Answer These Questions in Your Next Board Meeting?

One of the greatest challenges in maturing security programs stems from difficulty showing ROI on your security investments and communicating your security posture and effectiveness in a way that makes sense at the board-level. If you start talking about the number of events per second, firewalls blocked, or MTTR, eyes will start to glaze over […]

How to Stand Out in Your Cybersecurity Job Interview, as Told by ReliaQuest Lead Recruiter Brittany McKie

Job interviews can be a significant source of stress, whether you’re just starting your career in the cybersecurity industry, or you’re a seasoned expert looking for a new opportunity.  For many job seekers, the pandemic has created an additional layer of uncertainty in how to approach the process.  But with some preparation and an understanding of […]