Skip to main content

Ideas Center

Filter

Defensive LabsIdeasWhitepapers

Defensive Labs: Securing the Most Vulnerable Web Applications Known To Mankind

Defensive Labs shields vulnerable web applications using advanced security measures and state-of-the-art technology. Trust us to protect your applications.
CybersecurityIdeas

Free security rating and customized report

Free for Defensive Networks customers: get your organization’s Bitsight Security Rating and see how your security compares to industry benchmarks. Security ratings are a data-driven, dynamic measurement of an organization’s cybersecurity performance. Bitsight Security Ratings are the most widely used…
CybersecurityIdeas

Cyber Risks of the Digital Nomad

As we all know, the COVID-19 pandemic turned the world and the workplace upside down, making remote work not just a mere option but an absolute necessity. Businesses scrambled to pivot, and employees were thrust into the new reality of…
BEC Attacks
CybersecurityIdeas

Business Email Compromise (BEC) and Vendor Email Compromise (VEC) Attacks

Business Email Compromise and Vendor Email Compromise attacks have been the most prolific increase in cyber-attack vectors over the last few years. It seems that every organization we’ve talked to has one or more stories about paying fraudulent invoices, or…
segs_vs_ices
CybersecurityIdeas

SEGs vs ICES Solutions: Email Security Fundamentals

From simple tasks like scheduling appointments to complex operations like managing inventory, systems play a critical role in helping businesses run smoothly and efficiently.
Press Release

Shamrock Consulting Group Announces Rebrand to Defensive Networks

From simple tasks like scheduling appointments to complex operations like managing inventory, systems play a critical role in helping businesses run smoothly and efficiently.
IdeasWhitepapers

The State of US Cybersecurity Workforce Shortages

Cybersecurity is the top of the list when it comes to job shortages and skills gaps. The global workforce is short 3.4 million cybersecurity workers, and the largest shortage is right here in the US, with over 700,000 vacant cybersecurity…
MITRE ATT&CK Visualized
Defensive LabsIdeasWhitepapers

MITRE ATT&CK Visualized

With over 14,000 unique MITRE ATT&CK Tactics, Techniques and Procedures, mapped in Tableau, accessible for public use and research.
Cyber Insurance
Ideas

Why Are Cyber Insurance Premiums Increasing?

From simple tasks like scheduling appointments to complex operations like managing inventory, systems play a critical role in helping businesses run smoothly and efficiently.
DAST
Ideas

DAST, SAST, SCA and IAST

Dynamic application security testing (DAST), static application security testing (SAST), software composition analysis (SCA), and interactive application security testing (IAST) are all methods used to assess the security of an application.
CWP
Ideas

CWP and RASP

Cloud workload protection and runtime application self-protection (RASP) are two important technologies that are used to protect applications and data in the cloud.
in-depth
Ideas

The Defense in Depth Strategy Overview

In today's digital landscape, companies of all sizes and in all industries face a growing threat from cyber-attacks. In response, many organizations are adopting a ‘Defense in Depth’ approach to cybersecurity.
Key Takeaways MITRE ATT&CK 2022 MDR Evaluations
Ideas

Key Takeaways from MITRE ATT&CK 2022 MDR Evaluations

Mitre recently completed their first ATT&CK Evaluation specifically for Managed Detection and Response (MDR) vendors. Unlike many past ATT&CK Evaluations where participants were aware of the adversary Tactics, Techniques and Procedures (TTPs), this one was run as a “Black Box”,…
Ideas

Friends don’t let friends Cloud without a CASB

Implementing a CASB solution will help identify and protect against users accessing your services with compromised account credentials by detecting and remediating suspicious login alerts & failed login events in near-real time through user behavior analytics and threat intelligence.
Ideas

Zero Trust 2.0: Protect the Creds

Credentials remain one of the most sought-after pieces of information for hackers, and it’s still proving to be effective in their attack effort.