Week Nine – System Hardening: Administrative Controls and Residual Risk

When cybersecurity professionals consider residual risk, oftentimes the immediate thought is directed towards physical or technical controls. While these areas often have the most risk to analyze and mitigate, administrative controls should not be dismissed as having little risk involved. Arguably, administrative controls, as primarily dealing with the human element, may have some of theContinue reading “Week Nine – System Hardening: Administrative Controls and Residual Risk”

Week Eight – Uncommon Languages as a Security Bypass

Typical organizational security measures include signature, or even context recognition to identify malware inside the network. Attackers, forever creative, have begun to utilize less common languages to either write their malware, or for use as a file dropper to write the malware to the disk or into memory. There are several reasons why an attackerContinue reading “Week Eight – Uncommon Languages as a Security Bypass”