What Is Graph Technology? What Can It Do?
Graph technology can help examine your data from a new perspective; find out how graph technology may find previously unseen relationships in your data.
Jonathan is the new Chief Information Security Officer, joining us from IHS Markit, a global information services company, where he ran Cloud & Offensive Security and created a security data graph project with his team. Jonathan has held roles at AWS, NBCUniversal, Blue Cross/Blue Shield and is a US Army veteran. Outside of work Jonathan works on his blog, open source projects, spends time with his 2 daughters and practices home cooking, research in military histories of the world, and travels around the East Coast of the US.
Graph technology can help examine your data from a new perspective; find out how graph technology may find previously unseen relationships in your data.
This post describes how I took over an Azure Cloud Shell trusted domain and leveraged it to inject and execute commands in other users’ terminals.
Agentless scanning is an important security tool. We discuss how agentless scanning works, how it differs from agent-based scanning, and whether you need both.
Lightspin created a public repository with common use cases to simulate unusual/malicious activities within the Kubernetes cluster.
Cloud security is an ongoing requirement for all organizations born and built in the cloud. One way to probably demonstrate security controls is with a SOC 2 report.
Introducing our self-serve Free plan, and a jam-packed Premium offering. We’ve removed the guesswork from the traditional software buying process.
Curious about DevSecOps? We explain what DevSecOps is, how it works, and how integrating security throughout development helps create more secure systems.
The Complete Guide to AWS KMS. AWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the cryptographic keys used to protect ...
The Principle of Least Privilege can improve the security of your system. Learn what Principle of Least Privilege is, how it works, and best practices.
Wondering about CI/CD security? We explain why CI/CD security is essential, how it works, the tools you need, and best practices to overcome the challenges.
In this post you will be provided with several Python scripts for attempting to find resources with OpenSSL installed in them either directly or as ...
The fourth and final entry of the Microsoft Defender for Endpoint on AWS series by Jonathan Rau, CISO at Lightspin.
This blog offers answers to how the Amazon EKS Creation Engine (ECE) tool was created, use cases for it, and an explanation of some of the code ...
In our third Microsoft Defender for Endpoint (MDE) entry, we experiment with installing MDE onto Amazon Elastic Kubernetes Service (EKS) Nodes.
The second part of Lightspin's Microsoft Defender for Endpoint on AWS series by Jonathan Rau, CISO at Lightspin.
Leverage predictive attack path analysis and keep attackers out of your environment
In this post you will be provided with several Python scripts for attempting to find resources with OpenSSL installed in them either directly or as ...
The fourth and final entry of the Microsoft Defender for Endpoint on AWS series by Jonathan Rau, CISO at Lightspin.
This blog offers answers to how the Amazon EKS Creation Engine (ECE) tool was created, use cases for it, and an explanation of some of the code ...
In our third Microsoft Defender for Endpoint (MDE) entry, we experiment with installing MDE onto Amazon Elastic Kubernetes Service (EKS) Nodes.
The second part of Lightspin's Microsoft Defender for Endpoint on AWS series by Jonathan Rau, CISO at Lightspin.
This blog serves as the first part of our series that deep dives into Microsoft Defender for Endpoint on AWS.
© 2023 Lightspin