Blog

Filter by Product:

Filter by Product:

Lines of code up close.

QOMPLX Ideas: When should you start a Tech Program?

by QOMPLX | 11 hours ago

Managing complexities is mandatory for companies. How can businesses be sure which technology programs to sign off on?

READ MORE

Lines of code up close.

Emergent Threats To Your Healthcare Environment: Webinar

by QOMPLX | 7 days ago

A cyber attack on any organization is dangerous. A cyber attack on a critical healthcare environment can be a matter of life and death. Check out our recent webinar, featuring QOMPLX CISCO Andy Jaquith and Dale Nordenberg, M.D.: Authentication Attacks & Emergent Cyber Threats to Healthcare webinar.

READ MORE

Lines of code up close.

QOMPLX Knowledge: 10 Active Directory Health Checks You Should Know

by QOMPLX | 14 days ago

Active Directory attacks and exploits of vulnerable identity infrastructure are part of more and more sophisticated intrusions. Here are 10 tips for locking down and monitoring your AD environment.

READ MORE

Lines of code up close.

QOMPLX Knowledge: Fundamentals of Active Directory Trust Relationships

by QOMPLX | 19 days ago

Active Directory trust relationships allow users to access resources across AD forests and domains. Many of these relationships can be abused by attackers looking for lateral movement pathways on the network.

READ MORE

Lines of code up close.

QOMPLX Intelligence: Four Steps to Better OSINT Collection

by QOMPLX | a month ago

Open source intelligence plays a growing part in both cyber offense and defense. In this report, QOMPLX Senior OSINT Specialist Joe Gray describes four ways that individuals and organizations can sharpen their open source intelligence gathering.

READ MORE

Lines of code up close.

Active Directory Attacks Ramp Up in Recent Incidents

by Michael Mimoso | a month ago

Active Directory attacks against NTT and supply chain providers in Europe and Asia included the use of Mimikatz to target Active Directory credentials.

READ MORE

Lines of code up close.

New H-ISAC Framework tackles Authentication Risk in Healthcare

by Anna Rose Greenberg | a month ago

The healthcare ISAC (H-ISAC) is advising healthcare organizations to up their game including through the application of better analytic tools to spot authentication-based attacks.

READ MORE

Lines of code up close.

QOMPLX Knowledge: Kerberos Delegation Attacks Explained

by QOMPLX | 2 months ago

Kerberos Delegation Attacks exploit native delegation features in Active Directory that could allow a threat actor to impersonate users or machines and access services on the network.

READ MORE