Resources

Downloadable PDFs

Lares Continuous Defensive Improvement Through Adversarial Simulation and Collaboration corporate profile (image)

News & Events

Blog

Inside the Mind of a Lares Red Team: How OSINT Unlocks the Attack 1200 630 Jethro Inwald

Inside the Mind of a Lares Red Team: How OSINT Unlocks the Attack

Attackers don’t always need exploits—sometimes, they just need what your organization is already exposing. Before launching an attack, adversaries gather publicly available intelligence on employees, security tools, vendors, and internal processes to craft highly targeted phishing, vishing, and social engineering attacks. This blog explores how Organizational OSINT fuels real-world breaches and what security teams can do to reduce their exposure before it’s exploited.

read more
Custom Detection Engineering: Strengthening Blue Teams with Lares Purple Team Testing 1200 630 Andrew Heller

Custom Detection Engineering: Strengthening Blue Teams with Lares Purple Team Testing

Most security tools rely on default detections, making them ineffective against stealthy attackers. Lares helps SOC teams develop custom detection rules tailored to their unique threat landscape.

read more
Did you see that? Identify and Remediate Detection Blind Spots with Lares Purple Teaming 1200 630 Andrew Heller

Did you see that? Identify and Remediate Detection Blind Spots with Lares Purple Teaming

Discover how Lares’ Purple Teaming identifies detection blind spots and improves security visibility across SIEM, EDR, and network monitoring platforms.

read more
TTP Replay and Evaluation: Closing Detection Gaps with Lares Purple Teaming 1200 630 Andrew Heller

TTP Replay and Evaluation: Closing Detection Gaps with Lares Purple Teaming

Learn how Lares’ Purple Team Testing enhances cybersecurity by replaying real-world adversary tactics (TTPs) to improve detection and incident response.

read more
From Attack to Defense: How Lares Purple Teaming Exposes and Closes Security Gaps 1200 630 Andrew Heller

From Attack to Defense: How Lares Purple Teaming Exposes and Closes Security Gaps

Learn how Lares’ Purple Teaming methodology bridges the gap between Red and Blue Teams, enhancing real-time collaboration, threat detection, and incident response.

read more
Why Collaborative Cybersecurity Is Critical for Modern Enterprises 1600 1067 Andrew Heller

Why Collaborative Cybersecurity Is Critical for Modern Enterprises

Discover why collaborative cybersecurity, including Purple Teaming, is critical for modern enterprises facing today’s evolving threats.

read more
The Key Differences Between Red Teaming and Penetration Testing 1600 1257 Andrew Heller

The Key Differences Between Red Teaming and Penetration Testing

Learn the key differences between Red Teaming and Penetration Testing, and discover which approach is right for your organization.

read more
How Purple Teaming Bridges the Gap Between Offense and Defense 1600 972 Andrew Heller

How Purple Teaming Bridges the Gap Between Offense and Defense

Learn how Purple Teaming bridges the gap between Red and Blue Teams, enhancing collaboration, detection, and response to modern threats.

read more
What Is Red Team Testing and Why Your Business Needs It in 2025 1600 1071 Andrew Heller

What Is Red Team Testing and Why Your Business Needs It in 2025

Discover how Red Team Testing prepares your organization for sophisticated cyber threats in 2025. Learn why this advanced cybersecurity strategy is essential for your business.

read more
Advancing Beyond Regulatory Standards: Lares; Perspective on New York's Hospital Cybersecurity Regulation 1080 1080 Andrew Heller

Advancing Beyond Regulatory Standards: Lares; Perspective on New York's Hospital Cybersecurity Regulation

Home Blog Schedule call Advancing Beyond Regulatory Standards Lares’ Perspective on New York’s Hospital Cybersecurity Regulation Does Compliance Stop Hackers? New York’s Section 405.46 hospital cybersecurity regulation is a landmark step toward safeguarding patient data and maintaining operational continuity. By requiring measures such as appointing a CISO, conducting annual risk assessments, and implementing Multi-Factor Authentication…

read more

Webcasts

Videos

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2024 Lares, a Damovo Company | All rights reserved.

Error: Contact form not found.

Error: Contact form not found.

Privacy Preferences

When you visit our website, it may store information through your browser from specific services, usually in the form of cookies. Some types of cookies may impact your experience on our website and the services we are able to offer. It may disable certain pages or features entirely. If you do not agree to the storage or tracking of your data and activities, you should leave the site now.

Our website uses cookies, many to support third-party services, such as Google Analytics. Click now to agree to our use of cookies or you may leave the site now.