Filter by Product:
Filter by Product:
by QOMPLX | 10 days ago
Top leaders in FinTech, government and the payment industries discuss the importance of working together to defeat the enemy and the need for military precision to combat threat and ensure global payments are accessible, affordable and secure. See highlights from the lively panel discussion.
by QOMPLX | a month ago
Four business leaders discuss what it’s like to manage risk in a digital-first environment and how chief financial officers steer their way through an ever-changing role.
by QOMPLX | 3 months ago
An important aspect of the long-term solution for sustainably managing cyber risk has surfaced with the increased use of cyber telematics. Simply stated, the ongoing management and analysis of real-time data is a necessary means of managing cyber risk assessment and supporting risk transfer.
by QOMPLX | 3 months ago
(Re)insurance industry leaders who are told their companies have a good handle on their explicit and cyber accumulations have every reason to be skeptical and should consider modeling approaches with prospective modeling and better data.
by QOMPLX | 3 months ago
Jason Crabtree, QOMPLX CEO & Co-founder, explains in an interview with SecurityGuy TV why security and risk teams have to be able to dig into some of the fundamental assumptions for Kerberos Security and Active Directory Security. Here are a few key takeaways from the interview.
by Guest Author | 4 months ago
Few security teams pay sufficient attention to their Kerberos infrastructure – often citing its protocol complexity, as well as its operational ownership by IT. Despite the variety of telemetry being collected to your SIEM, you might be missing juicy stuff inherent in Kerberos-related activity.
by QOMPLX | 4 months ago
Most people view the words “complex” and “complicated” as synonyms. And that’s no surprise - that’s the way most dictionaries and thesauruses treat them. But in the worlds of math, science, and systems generally - they are not.
by QOMPLX | 5 months ago
In an industry that is rapidly moving towards identity-centric security, ADFS became a popular solution for providing smooth workflows to employees. However, the reality is that identity-based attacks have evolved that pinpoint specific weaknesses within ADFS.
1 / 2
Next