Quick Cookie Notification

This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.


View Cookie Policy for full details

msantarcangelo  

3 things you need to do to reap the benefits of detecting compromised credentials

Every party must come to an end. This final reflection on the Party Crashers series marks the end of our journey with the steps necessary for your success. Revealed and explored over the course of the series is the reality that compromised credentials are a…

What you need to know to build a solution to detect compromised credentials

Once convinced of the need to detect compromised credentials, the focus shifts to building the right solution. Ultimately, the act of learning what it takes to build a solution informs whether the better return comes from building or buying. It sets the stage to consider…

How to use compromised credentials as your key to funding success

The third conversation in the Party Crashers series opened with a challenge: time how long it takes you to review your logs, pick and IP address from last week, and connect the IP address to a name. Based on an informal show of hands, 15%…

Why hesitation hurts - act now to prevent costly problems later

The growing value of information and systems coupled with the shifting nature of attackers puts a lot of pressure on security professionals to demonstrate results. Adding to the challenge of balancing competing interests, resource constraints and budgets is the need to figure out how to…

Why you need to let go in security to get what you want

The second part of the Party Crashers series focused on the need for us to embrace change in order to combat the shifting nature of attackers and their penchant for compromised credentials. Guided by the preparation (/2014/07/29/embrace-the-c hange-we-need-in-security-to-reap-the-benefits), our conversation is global.…

Embrace the change we need in security to reap the benefits

The start of the Party Crashers (sign up here if you aren't already) series explored the shifting nature of attackers. In addition to taking a more disciplined, business-like approach, attackers value compromised credentials in their efforts. It lets them look like they belong, making them…

Why we can be optimistic in security even in the rise of compromised credentials

While use of compromised credentials in attacks isn't new, the growing trend is cause for consideration. Adapting our mindsets and actions to the changing nature of attackers is essential to achieving success in our efforts. The kick-off conversation of our _Party Crashers _Summer Series held…

Come Crash My Party! Your Invitation to Our Summer Series

Hey everyone, it's Michael Santarcangelo, the Security Catalyst - with an invitation to join me and Rapid7 on a journey over the next few weeks.   As the value of the systems and information we protect continues to grow, we face attackers that are more…