Transform the Defender’s Dilemma into the Defender’s Advantage

The notion that cybersecurity defenders are at an inherent disadvantage—the so-called defender’s dilemma—is incorrect and counterproductive. Instead of focusing solely on how we respond to attackers’ tactics, we can identify and use the advantages inherent in our position as defenders. This article explains what a defender-oriented mindset entails and how it can help you strengthen…

Read more

August 15, 2024
Read More >>

Are CISOs of Security Vendors in Your Community?

Organizing events that gather cybersecurity leaders requires significant effort and sponsorships. Unfortunately, some events and communities exclude CISOs who work for security vendors. This stance, though well-meaning, harms the industry and allows hidden conflicts of interest to go unchecked. Here’s why and how we can address this issue to improve such events and the community…

Read more

June 21, 2024
Read More >>

How to Write Good Incident Response Reports

Creating an informative and readable report is among the many challenges of responding to cybersecurity incidents. A good report not only answers its reader’s questions but also instills confidence in the response and enables the organization to learn from the incident. This blog highlights my advice on writing such incident reports. It’s based on the…

Read more

June 14, 2024
Read More >>

My Story So Far and Your Own Career Journey

Wherever you are in your professional journey, it helps to peek into another’s career story to learn from their approach, mistakes, and triumphs. In the following three videos, I reflect on my career so far to share my story, hoping that others in the industry will find it useful. Perhaps you’ll glean from these short…

Read more

June 8, 2024
Read More >>

Researchers Uncovered the Hack of a Private Power Station in Israel

In the continuing Israel-Palestine conflict, there has been a noticeable rise in hacktivist groups who are planning an unending attack against a variety of targets on both sides of the conflict. On October 8, the Cyber Av3ngers group revealed a significant hack on the Israeli Dorad private power station. The organization posted images of the allegedly […]

The post Researchers Uncovered the Hack of a Private Power Station in Israel appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.

October 17, 2023
Read More >>

How Security Can Better Support Software Engineering Teams

As the CISO at a tech company (Axonius), my responsibilities include empowering our software engineering teams to maintain a strong security posture of our products. While everyone agrees that security is important, the different incentives of security and engineering teams can make it harder to collaborate. Here’s some advice on weaving security into the software…

Read more

October 5, 2023
Read More >>

Cartographer – Advanced Code Coverage Mapping in Ghidra

Introduction There’s no doubt that reverse engineering can be a very complex and confusing matter, even for those that love doing it. Jumping into a program and being greeted with tons of assembly and weirdly-named functions and variables is hardly what most would call a fun time. Not to mention that identifying specific functionality in […]

October 2, 2023
Read More >>