Red Team

Cultivating a Culture of Security and Innovation through Red Teaming

Cultivating a Culture of Security and Innovation through Red Teaming 1600 1067 Andrew Hay
Red Teaming is more than a cybersecurity exercise; it’s a strategic tool that can significantly enhance an organization’s resilience, innovation, and strategic planning when integrated into the organizational culture and risk management framework. As executives, we champion this approach, fostering a culture that values continuous improvement, openness, and strategic foresight. read more

Navigating the Red Teaming Process: An Executive Guide to Effective Cybersecurity Practices

Navigating the Red Teaming Process: An Executive Guide to Effective Cybersecurity Practices 1600 1067 Andrew Hay
Red Teaming is an essential component of a comprehensive cybersecurity strategy. By meticulously planning, executing, and analyzing Red Team exercises, organizations can significantly enhance their preparedness for real-world cyber threats. As executives, our commitment to these practices protects our digital assets and reinforces our reputation as a secure and trustworthy business. read more

Executive Insight: Mastering Red Teaming for Enhanced Security

Executive Insight: Mastering Red Teaming for Enhanced Security 1600 1067 Andrew Hay
Understanding Red Teaming’s significance is vital for robust security in the evolving cybersecurity domain. It’s more than hacking; it encompasses penetration testing, physical security assessments, and adversarial simulations. This approach tests and enhances resilience against diverse threats, ensuring comprehensive organizational security. Executives must recognize its strategic importance for safeguarding assets. read more

Distractions, Dilution, & Permissive Infrastructures … (Chris Krebs, CyberWarCon 2021)

Distractions, Dilution, & Permissive Infrastructures … (Chris Krebs, CyberWarCon 2021) 1080 720 Mark Arnold

Chris Krebs Keynotes CyberWarCon 2021 In recent years ahead of Thanksgiving, I’ve made an effort to attend one of the newest CONs on the circuit and maybe now my favorite…

read more

What the White House Ransomware Memo Got Wrong

What the White House Ransomware Memo Got Wrong 2048 1365 Andrew Hay

On June 2nd, Anne Neuberg, Deputy Assistant to the President and Deputy National Security Advisor for Cyber and Emerging Technology, released a memo with the subject: What We Urge You…

read more

Introducing Sysmon Config Pusher

Introducing Sysmon Config Pusher 1026 685 Anton Ovrutsky

Introducing Sysmon Config Pusher When providing various services to clients, including Purple, Blue, and Red Team engagements, the Lares team often recomends Sysmon to close detection gaps. Indeed, Sysmon is…

read more

Getting into the Blue Team: A Practical Guide

Getting into the Blue Team: A Practical Guide 1090 1105 Anton Ovrutsky

Intro Are you a person who is new to the Information Security industry and want to get deeper into the defensive side of our wonderfully broad and complex industry? Have…

read more

How to Scope Your Next (or First) Pentest

How to Scope Your Next (or First) Pentest 2048 1365 Mark Arnold

How to Scope Your Next (or First) Pentest The following blog post summarizes some of the key points from the first extracted session of the inaugural Lares Customer Summit that…

read more

Purple Teaming with Lares

Purple Teaming with Lares 2048 1536 Mark Arnold

Purple Teaming With Lares The following blog post summarizes some of the key points from the first extracted session of the inaugural Lares Customer Summit that took place on Wednesday,…

read more

Security and Converged Workspaces

Security and Converged Workspaces 2048 1365 Mark Arnold

The Forcibly Converged Network The convergence of home and corporate networks continues unabated. Converged workspaces are here to stay for the foreseeable future. Most converged networks that we assess are…

read more

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2024 Lares, a Damovo Company | All rights reserved.

Error: Contact form not found.

Error: Contact form not found.

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.