advanced-menu-icon

Cybersecurity in ATM: Investigating VPN Logs in Incident Response

For about two decades, security leaders were told over and over by many vendors that the key to good security is setting up proper VPNs (virtual private networks) which promised encryption and protection against malicious actors. With the rise of remote work, global work forces, contractors and trusted 3rd parties having access to the company network, having the right solution in place, coupled with proper logging and monitoring, can help you detect any potential issues before they become a major incident.

Read the blog

Navigating the Void: The Critical Need for Cybersecurity Professionals in Air Traffic Control

In the vast expanse of the digital skies, where data streams intersect with the safety of millions of passengers daily, lies a realm of paramount importance: Air Traffic Control (ATC) cybersecurity. Ensuring the integrity, confidentiality, and availability of aviation systems is not just a matter of convenience; it's a matter of life and death. However, beneath the surface of this crucial field lies a concerning gap: the scarcity of qualified cybersecurity professionals with dedicated undergraduate, master's, and Ph.D. degrees tailored to the unique challenges of ATC.

Read the blog

Space, Defence and Cybersecurity Mission with the Royal Highnesses of Belgium and Luxembourg

On April 17-18, I had the privilege of attending a bi-national sector conference focused on addressing security and defense challenges related to space. The event was of significant national importance, underscored by the esteemed presence of Their Royal Highnesses Grand Duke Henri of Luxembourg (front left in the photo), King Philippe of Belgium (front middle), as well as the Luxembourgish and Belgian Ministers of Defense.

Read the blog

Cybersecurity in ATM : Investigating Windows Logs in Incident Response

The keys to successful incident response equate to having the proper people, processes, and tools in place to act decisively when an incident occurs, which is a recurring theme in our incident response articles. Without proper logging occurring ahead of time, which is a large part of the picture for security operations and incident response, teams, it will make it difficult to prove how long a threat actor was in an environment, and depending on the lack of logs, could be very difficult to provide analysis on activities taken by the threat actors or insider threats depending on the case scenario.

Read the blog

Cybersecurity in ATM: Investigations Using Firewall Logs

This article sheds light on Firewall Logs in incident investigations. We explore key behaviors and patterns for effective threat detection

Read the blog

Cybersecurity in ATM: Investigating Cyber Incidents Using the 2FA Logs

Background

Historically, security teams would advocate for their IT teams and management to approve the implementation of multi-factor authentication in order to reduce the impact of threats such as brute force attacks against passwords, mitigate fall out from phishing emails and other social engineering related attacks. For context, there are multiple methods of implementing two factor authentication, which includes but is not limited to, SMS based, voice and app based. Once an implementation is in place, this will provide security and incident response teams additional protection and more importantly, additional data points to investigate security alerts.

Read the blog

Cybersecurity in ATM: Investigations Incidents with Cloud Access Security Broker (CASB) Data

CASB solutions can help your business in addressing risk in cloud-based services, consistently enforce security policies and comply with regulations, even when these services reside beyond your perimeter and out of your direct control. The value stems from the ability to identify high-risk applications, users, and other key risk factors across cloud platforms - a potential blind spot for many businesses.

Read the blog

Cybersecurity in ATM : Endpoint Detection and Response (EDR) logs

Endpoint detection and response (EDR) provides continuous monitoring and analysis of endpoints, aiding incident response teams in efficiently managing threats and reducing overall response times in cybersecurity operations.

Read the blog

Cybersecurity in ATM : Using the Security Stack for Investigations – Password Reset Logs

This article explores cyber investigations through leveraging the Security Stack. It sheds light on the role of password reset logs in swift breach detection and mitigation.

Read the blog