Firmware and Frameworks: MITRE ATT&CK
Learn how firmware security fits into this widely used framework that tracks and maps adversary actions. Find out which tactics and techniques are leveraging firmware vulnerabilities and known exploits.
Learn how firmware security fits into this widely used framework that tracks and maps adversary actions. Find out which tactics and techniques are leveraging firmware vulnerabilities and known exploits.
Two intersecting trends — the recent firmware explosion and rampant ransomware — have caused havoc and made security teams question their previous strategies. This research illustrates how we got here …
As firmware-level threats continue to gain popularity in the wild, security teams need to understand how these threats work and the real-world risks they pose to an organization’s security. Recently …
Every piece of information and communications technology (ICT) equipment in an organization today is an amalgamation of chips, components, and code from a convoluted chain of vendors and suppliers. Any …
The cybersecurity teams who defend financial services organizations are engaged in what often feels like hand-to-hand combat with financially and politically motivated adversaries. Teams must simultaneously enable highly-tailored omni-channel customer …
Learn how organizations can apply the core concepts of Zero Trust to mitigate their risk and prevent firmwarebased attacks such as DMA attacks, with the goal in mind to provide …
How to Navigate This Change and Shift to a Risk-Centric Approach CISOs and other security executives have long been perceived as the “no” people of the organization, shutting down new …
By Meghan Maneval, Director of Technical Product Management at Reciprocity Because of the dramatic acceleration of digital transformation, many organizations have accepted associated risk rather than taking the time to …
Why Pentesting Needs to Evolve Antiquated legacy penetration testing methods fail to catch all the critical vulnerabilities that exist within a company’s environment, which puts organizations at risk. Security teams …
We looked into our crystal ball (and surveyed over 100 CX professionals) to predict what’s next in CX With 79% of CX professionals believing the role of customer service to …
