A View From Inside a Deception Pen-testing today's threat deception technology is not for the faint-hearted. Do modern deception tools truly frustrate adversaries, and are they ready for the enterprise SOC?
Is Your Adversary James Bond or Mr. Bean? Especially with nation-state attacks, its critical to assess whether you're up against jet fighter strength or a bumbler who tries to pick locks.
Microsoft 365: Most Common Threat Vectors & Defensive Tips Security pros discuss the most typical ways attackers leverage Microsoft 365 and share their guidance for defenders.