As cyberattacks grow more advanced and data breaches more severe, organizations are transitioning from implicit trust security models to Zero Trust Architectures (ZTA). The core principle of Zero Trust is “never trust, always verify” which mandates strict identity...
Imagine you are a cybersecurity incident responder. Picture it: A developer discovers that the website of one of your subsidiaries has been defaced by a well-known hacking group that targets your industry. The website is running in a Kubernetes cluster. Before...
Indicators of compromise are different for every single piece of malware and exploit but there are common denominators. This article will cover determining cloud exploitation, the most common indicators that may mean a set of cloud resources, accounts, or services...
Zero Trust Architecture (ZTA) is a security concept that assumes that all network traffic is untrusted and must be verified before it can be allowed access to sensitive resources. The traditional approach to cybersecurity, known as the “castle and moat”...
When I was a kid, my grandpa would inevitably fall asleep watching Sunday Afternoon Baseball, leaving time for my cousin and I to sneak a VHS in the VCR while he was unaware. A frequent pick was monster truck rallies. We would then spend the next hour (or until...
In light of the drastic increase in cyber attacks, Oteemo decided to look into the Trucking and Logistics spaces and because it has such a large footprint, it also has great potential to incur some very costly incidents. Fascinated by all the areas for a...