Skip to main content

Posts

Red Teaming 101: the benefits of employing red teaming as a cybersecurity tactic.

Red teaming is a powerful cybersecurity tactic If you were a bank robber, which kind of banks would you rob? Probably not the bank with a 24-hour police presence on its premises. And most certainly not the banks with an army of armed guards, bollards, and security cameras at every entrance. In cybersecurity, we call that vulnerability analysis. It's where we ask ourselves: "If I were a cybercriminal, what would I attack?" The answer to that question is called the attack surface: the sum of all potential vulnerabilities in a system. Red teaming is the practice of using a "fake" attacker to test the security of a business. The attacker will attempt to gain entry into the company's confidential files and databases, using whatever means necessary. The goal of this exercise is to find any weaknesses in their system, which can then be fixed. The Sugar Security Suite uses these methods to determine how easy it would be for someone without authorization to access yo...
Recent posts

Data Privacy Week with Sugar Security and OkieTech!

  Data Privacy week is here! You have probably heard of data privacy, but why is there a whole week of it?  Data Privacy Week was created as an international effort to empower individuals and encourage businesses to respect privacy, safeguard data, and enable trust. Here are the 7 Principles that are recognized most: Principle 1: Lawfulness, Fairness, transparency Principle 2: Purpose Limitation Principle 3: Data Minimization Principle 4: Accuracy Principle 5: Storage Limit Principle 6: Integrity & Confidentiality (Security) Principle 7: Accountability We highly recommend checking out:  Here It's a great reminder to check in on how you're handling customer data and maybe see ways to better it! Data privacy has been getting more traction as we go further into tech and is a necessary step to ensure customer data is in the right hands. Not only that, your customers trust you with their data, so how are you staying up to date with all these changes?

Sugar Security – Using Red Teams To Ensure Data Security

The issue with data privacy is not just a matter of users’ privacy but also to the business itself -  A compromised customer database may cost you customers and future revenue. It’s a giant pain point for both your customers and business alike.  Data breaches and privacy violations have become routine news, a great example being the Facebook/Cambridge Analytica debacle. The latter incident has raised a number of questions about how the social network handled the personal information of 50 million users. Suffice to say, there is a growing need to keep sensitive data safe. After all, this is not just about protecting your company's brand. At stake is the trust that customers place in organizations they engage with and entrust their private information to. By failing to protect their data, businesses can face penalties as well as lose customers. Data breach insurance, once considered a distant possibility, has now become an urgent priority for many businesses. Some companies...

Want to use Serverless Python APIs with AWS Chalice? Well here you go!

Serverless Python APIs with AWS Chalice Get started in 4 steps: Get an AWS Account Set up API Keys for your AWS Account Configure the AWS CLI Install Chalice and say “Hello World!” Get an AWS Account https://aws.amazon.com/premiumsupport/knowledge-center/create-and-activate-aws-account/ If you’ve signed up for  any  website before, you can sign up for AWS. It will ask for a credit card, but you can do a lot of crazy stuff with it  for free Set up API Keys for your AWS Account https://youtu.be/665RYobRJDY When choosing permissions for the keys, you get to weigh the risk vs. the amount of research you need to do. It’s the easiest upfront to add the user to the Admins group. Configure the AWS CLI Windows Download and run the MSI installer from https://awscli.amazonaws.com/AWSCLIV2.msi Linux curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip" unzip awscliv2.zip sudo ./aws/install Testing your Installation aws --version Configuring with y...

Sugar Security – Using Red Teams To Ensure Data Security

The issue with data privacy is not just a matter of users’ privacy but also to the business itself - A compromised customer database may cost you customers and future revenue. It’s a giant pain point for  both your customers and business alike.  Data breaches and privacy violations have become routine news, a great example being the Facebook/Cambridge Analytica debacle. The latter incident has raised a number of questions about how the social network handled the personal information of 50 million users. Suffice to say, there is a growing need to keep sensitive data safe. After all, this is not just about protecting your company's brand. At stake is the trust that customers place in organizations they engage with and entrust their private information to. By failing to protect their data, businesses can face penalties as well as lose customers. Data breach insurance, once considered a distant possibility, has now become an urgent priority for many businesses. Some companies...

Adapting from Pentesting to Real-Time Vulnerability Scanning

Organizations should make the upgrade from disjointed penetration tests and MSSP services to a centralized and real-time solution. In the first half of 2020,  27 billion data records were exposed , including personal information, login credentials, financial data, PHI health records, and more. Covid-19 added to this, with  Trend Micro finding 9 million Covid-19-related threats  between January to June 2020. Many cyber-criminals specifically target smaller businesses, which are seen as ‘low hanging fruit’ with fewer resources available to prevent a cyber-attack. When we look at the cyber-threat situation, it feels as if cybersecurity is out of control. Just as one vulnerability or entry point is closed, another opens. The SMB is always on the run, playing catch-up as cybercriminals forge ahead, innovating around cybercrime. But help is here. Real-Time Vulnerability Detection is a technique that is managed on behalf of an SMB, giving them the tools to turn the tables on cyb...