Indicators of compromise are different for every single piece of malware and exploit but there are common denominators. This article will cover determining cloud exploitation, the most common indicators that may mean a set of cloud resources, accounts, or services...
Zero Trust Architecture (ZTA) is a security concept that assumes that all network traffic is untrusted and must be verified before it can be allowed access to sensitive resources. The traditional approach to cybersecurity, known as the “castle and moat”...
When I was a kid, my grandpa would inevitably fall asleep watching Sunday Afternoon Baseball, leaving time for my cousin and I to sneak a VHS in the VCR while he was unaware. A frequent pick was monster truck rallies. We would then spend the next hour (or until...
In light of the drastic increase in cyber attacks, Oteemo decided to look into the Trucking and Logistics spaces and because it has such a large footprint, it also has great potential to incur some very costly incidents. Fascinated by all the areas for a...
When I started working with Kubernetes and Infrastructure as Code, I quickly found out that I needed a secrets management solution, but when I googled around there didn’t seem to be a solid consensus on a best practice approach that could be universally applied to all...
If you work for the government or are familiar with TLA (Three Letter Acronyms, i.e. FBI, CIA, WTF. etc.) then you know what this blog is about. If not, it is about automating your deployment to the cloud and knowing there is some level of security applied to the...