Blog

Filter by Product:

Filter by Product:

Card image cap

The Smartest Companies are Embracing the Cyber Telematics Revolution

by QOMPLX | a month ago

An important aspect of the long-term solution for sustainably managing cyber risk has surfaced with the increased use of cyber telematics. Simply stated, the ongoing management and analysis of real-time data is a necessary means of managing cyber risk assessment and supporting risk transfer.

READ MORE

Card image cap

Prospective Simulation Modeling – The Cyber Risk Solution

by QOMPLX | a month ago

(Re)insurance industry leaders who are told their companies have a good handle on their explicit and cyber accumulations have every reason to be skeptical and should consider modeling approaches with prospective modeling and better data.

READ MORE

Card image cap

Active Directory Security: Trust but Verify

by QOMPLX | 2 months ago

Jason Crabtree, QOMPLX CEO & Co-founder, explains in an interview with SecurityGuy TV why security and risk teams have to be able to dig into some of the fundamental assumptions for Kerberos Security and Active Directory Security. Here are a few key takeaways from the interview.

READ MORE

Card image cap

AI-based Identity Analytics

by Guest Author | 2 months ago

Few security teams pay sufficient attention to their Kerberos infrastructure – often citing its protocol complexity, as well as its operational ownership by IT. Despite the variety of telemetry being collected to your SIEM, you might be missing juicy stuff inherent in Kerberos-related activity.

READ MORE

Card image cap

Complex ≠ Complicated

by QOMPLX | 3 months ago

Most people view the words “complex” and “complicated” as synonyms. And that’s no surprise - that’s the way most dictionaries and thesauruses treat them. But in the worlds of math, science, and systems generally - they are not.

READ MORE

Card image cap

Golden Ticket Attack on Active Directory Federated Services

by QOMPLX | 3 months ago

In an industry that is rapidly moving towards identity-centric security, ADFS became a popular solution for providing smooth workflows to employees. However, the reality is that identity-based attacks have evolved that pinpoint specific weaknesses within ADFS.

READ MORE

Card image cap

Kerberos Fundamentals

by QOMPLX | 3 months ago

Recently developed and readily available tools have revealed a fundamental vulnerability in Kerberos’ inability to validate its own ticket exchanges.

READ MORE

Card image cap

Honesty about Effective Cyber Risk Modeling for Insurance Companies

by QOMPLX | 3 months ago

As cybersecurity plays a larger and larger role in daily lives and the global economy, there is growing importance to accurately understand and price cyber-related risks. Doing this correctly, is an important part of engendering better behavior...

READ MORE