Lares

Empowering Organizations to Maximize Their Security Potential

The CIS Telework Security Guide

The CIS Telework Security Guide 2048 1365 Mark Arnold

CIS Telework Guidance The folks over at the Center for Internet Security, whose core mention is to secure online experiences, have authored security guidance for teleworkers. The CIS recently released…

read more

Security and Converged Workspaces

Security and Converged Workspaces 2048 1365 Mark Arnold

The Forcibly Converged Network The convergence of home and corporate networks continues unabated. Converged workspaces are here to stay for the foreseeable future. Most converged networks that we assess are…

read more

WFH Lateral Movement TTPs

WFH Lateral Movement TTPs 800 533 Anton Ovrutsky

WFH Lateral Movement TTPs With the increase of remote working arrangements due to the ongoing pandemic, corporate endpoints are now located far beyond the standard corporate perimeter. This presents attackers…

read more

From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472)

From Lares Labs: Defensive Guidance for ZeroLogon (CVE-2020-1472) 2048 1365 Anton Ovrutsky

About Zerologon (CVE-2020-1472) On September 11th, 2020, Secura researcher Tom Tomvoort published a blog post outlining the Zerologon vulnerability. Microsoft’s August Patch Tuesday releases contained a patch for CVE-2020-1472 which…

read more

School’s On(line) Kids – Is it Safe and Cybersecure?

School’s On(line) Kids – Is it Safe and Cybersecure? 2048 1446 Mark Arnold

School Days It’s Fall again and school is open (for most) in various modes of operation after several months of disruption due to COVID-19. Whether school districts offer in-person, virtual,…

read more

Seeing Red

Seeing Red 1638 2048 Mark Arnold

Seeing Red Recently, I asked my Lares mates to comment on a red team (RT) architecture post I stumbled upon. A volley of responses ensued with the conclusion: “That’s a…

read more

Time for Transition: From ACET to InTREx-CU

Time for Transition: From ACET to InTREx-CU 2048 1366 Mark Arnold

The Transition from ACET to InTREx-CU for Credit Union Examinations The National Credit Union Association (NCUA) Chairman Rodney Hood discussed changes to the credit union (CU) CyberSecurity and Technology examination…

read more

Security Program Components 101

Security Program Components 101 1090 727 Andrew Hay

The term “security program” means a lot of different things to a log of different people. To some, it’s just an acceptable use policy or password policy. To others, it’s…

read more

Webinar – Defensive Strategies: The Power of Visibility

Webinar – Defensive Strategies: The Power of Visibility 1090 728 Andrew Hay

Defensive Strategies: The Power of Visibility When: OnDemand About the Webinar: Security programs are struggling with noise. What is legitimate and what is suspicious? Attackers use that to their advantage…

read more

Hunt Fast: Splunk and tstats

Hunt Fast: Splunk and tstats 1090 818 Anton Ovrutsky

Intro One of the aspects of defending enterprises that humbles me the most is scale. Enabling different logging and sending those logs to some kind of centralized SIEM device sounds…

read more

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

Email Us

©2025 Lares, a Damovo Company | All rights reserved.