Resources

Downloadable PDFs

News & Events

Blog

Choosing the Right Application Security Assessment Company 1090 727 Andrew Hay

Choosing the Right Application Security Assessment Company

If you are looking for an application security assessment company, it is important to do your research and find one that best fits the needs of your business. With so many options on the market, it can be difficult to know where to start. Here are a few factors to consider when choosing an application…

read more
Tactical Cybersecurity Risks vs Strategic Cybersecurity Risks 1080 360 Andrew Hay

Tactical Cybersecurity Risks vs Strategic Cybersecurity Risks

Organizations must address both types of risk to be fully protected against cyberattacks.

read more
Push Fatigue: We’re tired too 640 450 Alex Kozlov

Push Fatigue: We’re tired too

A technique known as “MFA bombing” allows attackers to bypass Multi-Factor Authentication. This post explains how to detect it.

read more
What is Ransomware and How Can I Protect Myself From It? 2048 1536 Andrew Hay

What is Ransomware and How Can I Protect Myself From It?

Ransomware is malware that encrypts your files and holds them hostage, until you pay a ransom. It’s a serious problem that can have devastating consequences for individuals and businesses alike.

read more
Lares is Growing 1364 2048 Andrew Hay

Lares is Growing

Lares is actively looking to expand the team by adding Sales Development Representatives and Account Managers to our growing sales team. If you or anyone you know is interested, please apply below. We look forward to hearing from you!   Account Manager Job Description Lares is looking for a qualified Account Manager (AM) to find…

read more
How I Compromised Your Complex Password from The Internet 1090 204 Ben Goodman

How I Compromised Your Complex Password from The Internet

How I Compromised Your Complex Password from The Internet One of an attacker’s first goals is to gain a foothold in a target environment. The role or permissions of an end user does not matter if it can be leveraged to gain access. Many password guides encourage longer, more complex passwords, making it more difficult…

read more
Azure and Azure Active Directory Monitoring Use Cases 1522 2048 Anton Ovrutsky

Azure and Azure Active Directory Monitoring Use Cases

Intro Wrangling data exposed by various Azure services is a daunting challenge. Because numerous tables exist with many available data types, finding the table with a particular Azure action or its associated query often proves difficult. Azure Monitor can aid you in this journey. Azure Sentinel comes with a number of preconfigured analytic detection rules.…

read more
New Defensive Guidance from the NSA 1090 726 Andrew Hay

New Defensive Guidance from the NSA

Today, the National Security Agency (NSA) released its new “Network Infrastructure Security Guidance” technical report. The document captures best practices based on experience in supporting customers and responding to threats that can be applied across any network environment. This report presents best practices for overall network security and protection of individual network devices and aims…

read more
Stress Test Your Incident Response Capabilities with Tabletop Exercises 1090 726 Andrew Hay

Stress Test Your Incident Response Capabilities with Tabletop Exercises

In order to be adequately prepared for a cybersecurity incident, it is important to stress test your incident response capabilities. One way to do this is by conducting regular tabletop exercises. Tabletop exercises are simulations that allow you to test your incident response plan in a safe and controlled environment. In this blog post, we…

read more
The Lowdown on Lateral Movement 1090 749 Anton Ovrutsky

The Lowdown on Lateral Movement

What Is Lateral Movement ? Lateral movement is a broad MITRE ATT&CK category, consisting of nine distinct techniques and numerous sub techniques. Due to its breadth and linkages between other areas of the ATT&CK framework, lateral movement becomes an increasingly interesting category, presenting numerous challenges to defenders. The category of lateral movement is indeed intrinsically…

read more

Webcasts

Videos

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2022 Lares, LLC | All rights reserved.
Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.