Know Your Assets: Talking with Jonathan Cran from Intrigue
The constant risk of cyberthreats on organizations and their digital landscapes makes knowing your assets and the extent of your attack surface crucial. Reconnaissance is one of the first steps attackers will take to discover any unprotected and unmonitored assets, and use them as means to gain access to your network.
Through a Data Scientist’s Lens: Interview with Ilija Subašić, PhD
For many, the job title of data scientist can seem a bit perplexing. What do they actually do? Is this really the sexiest job title of the 21st century? What makes their perspective on data so different than our non-data perspective? Today, we ask SecurityTrails’ Lead Data Scientist to find out.
Cloud security, open S3 buckets and where do we stand now: Interview with Vincent Yiu
While cloud computing itself is not a new concept, everything related to it is in a constant state of change and rapid growth. Adoption is at an all-time high, with the market projected to grow to over $302 billion by 2021 and a consistent emphasis on cloud security.
Cybersecurity Experts Interview Series Recap
Today we are recapping our interview series we started back in February, and all the great people we’ve had the chance to talk to.
How Stack Overflow kick-started an entire business: Talking with Ben Dowling from IPinfo
When you have a programming question, Stack Overflow is one of the, if not the, best place to go. Developers of all types have been turning to Stack Overflow’s community for assistance since 2008.
It’s never been easier to make a great product: A chat with Johannes Gilger from Urlscan.io
Since the dawn of the Internet, people dreamed of starting their own online business, though few truly succeeded in that task. With all of the technology and services available today, becoming an entrepreneur seems easier than ever before.
Know your attacker: Speaking with Josh Kamdjou from Sublime Security
We’re all aware of the age-old debate among those in cybersecurity circles about who’s better, red team or blue team? The lighthearted “animosity” between red and blue teams can be fun, but the truth is, there is no benefit to picking sides, as both ultimately have the same goal — preventing cyber crimes.
Bringing Cybersecurity into Academia: We Talk with Patrik Hudak
The rise of cyberthreats, in both scale and technique, has brought an increased attention to and demand for cybersecurity. However, academia and the publication of academic papers, struggle to keep up with the frequent shifts in trends and methods. Coupled with the fact that many people interested in cybersecurity are working professionals who may not have the time to read more lengthy academic papers, we are seeing more people turn to conference papers and blog posts for this information.
No Incident Unnoticed: Interview with Troy Mursch from Bad Packets Report
In 2017 we saw the rise of cryptojacking and botnet activity. Even through 2018, it showed no signs of stopping. Notably, we saw plenty of unique cryptojacking campaigns that targeted vulnerable MikroTik routers and Drupal websites, as well as other types of botnets that were Mirai-like aberrations.
OSINT is Maturing: Our Interview with Steve Micallef from SpiderFoot
Only a few years back, OSINT wasn’t that widespread, but today advancements in the OSINT field have encouraged the constant growth of, not just the tools that are available, but also the community around it.