security

Insider Threats: Mitigating Internal Cybersecurity Risks in the Finance Sector

Insider Threats: Mitigating Internal Cybersecurity Risks in the Finance Sector 1600 1067 Mark Arnold
Cybersecurity is not just a legal requirement; it’s an ethical responsibility to protect the assets and interests of all stakeholders in the financial ecosystem. read more

Cybersecurity Compliance: Navigating Regulations in the Insurance Industry

Cybersecurity Compliance: Navigating Regulations in the Insurance Industry 1600 1068 Darryl MacLeod
Insurance companies must adopt a proactive and comprehensive approach to navigate the complex landscape of cybersecurity regulations.  read more

The Future of Cybersecurity in Manufacturing: Trends and Predictions

The Future of Cybersecurity in Manufacturing: Trends and Predictions 1600 1067 Darryl MacLeod
Manufacturers face the challenge of safeguarding critical operations and intellectual property from malicious actors constantly evolving their tactics. As a result, innovative approaches to cybersecurity are essential to protect sensitive information and ensure the smooth functioning of manufacturing processes. read more

Cyber Threat Intelligence: Enhancing Financial Sector Resilience

Cyber Threat Intelligence: Enhancing Financial Sector Resilience 1600 1203 Mark Arnold
Incorporating Cyber Threat Intelligence into business processes and continuity strategies is no longer a luxury but a necessity for the financial sector. Learn why. read more

Cyber Incident Notification Requirements for Federal Credit Unions

Cyber Incident Notification Requirements for Federal Credit Unions 1600 1067 Andrew Hay
If you’re unsure where to start with the NCUA’s Cyber Incident Notification Requirements, here’s how a Lares’ Virtual Chief Information Security Officer (vCISO) service can assist in getting ready for the impending rule. read more

Strengthening Cybersecurity Practices: An Overview of the SEC's Latest Rules

Strengthening Cybersecurity Practices: An Overview of the SEC's Latest Rules 1600 1067 Darryl MacLeod

Introduction Businesses are increasingly facing a constant and daunting challenge: the threat of cyberattacks. This global issue poses significant obstacles to companies of all sizes and industries. With technology playing…

read more

Push Fatigue: We’re tired too

Push Fatigue: We’re tired too 640 450 Alex Kozlov
A technique known as “MFA bombing” allows attackers to bypass Multi-Factor Authentication. This post explains how to detect it. read more

Azure and Azure Active Directory Monitoring Use Cases

Azure and Azure Active Directory Monitoring Use Cases 1522 2048 Anton Ovrutsky

Intro Wrangling data exposed by various Azure services is a daunting challenge. Because numerous tables exist with many available data types, finding the table with a particular Azure action or…

read more

Kubernetes Hunting & Visibility

Kubernetes Hunting & Visibility 1280 905 Anton Ovrutsky

Intro Enterprise workloads are increasingly shifting to modern micro-service architectures. This shift can potentially mean that visibility, hunting, and defensive frameworks lag behind their traditional on-premises architectures and deployments. The…

read more

The Top 3 Security Program Tasks to Tackle in the New Year

The Top 3 Security Program Tasks to Tackle in the New Year 1024 682 Andrew Hay

In the spirit of the New Year, it’s time to reflect on the past and make measurable resolutions for the future. Many people use this time to focus on personal…

read more

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2024 Lares, a Damovo Company | All rights reserved.

Error: Contact form not found.

Error: Contact form not found.

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.