BreakingPoint Labs Blog

Syndicate content
Updated: 42 min 15 sec ago

MACsec Hardware Testing—Why Back-to-Back Validation Falls Short

Thu, 2020/07/02 - 21:46
MACsec has become an important encryption technology that is shipped with next-generation chips,…
Categories: Security Posts

ATI Adds Maze Ransomware Attack Campaign

Thu, 2020/07/02 - 21:46
Last month, the Application and Threat Intelligence (ATI) Team released a new type of cyberattack…
Categories: Security Posts

Monitoring SSL VPN Gateways - A Step-by-Step Guide

Thu, 2020/07/02 - 21:46
Virtual private network (VPN) connectivity is one of the most critical services in today’s…
Categories: Security Posts

Assess the Effectiveness of Dynamic NGFW Updates: Palo Alto Security Audit

Thu, 2020/07/02 - 21:46
One benefit of breach and attack simulation is continuous assessment, and I set Keysight Threat…
Categories: Security Posts

Assess Cloud-based Web Application Firewalls with Breach and Attack Simulation

Thu, 2020/07/02 - 21:46
Securing your web applications is a necessity. As the 2020 Verizon DBIR reports, web application…
Categories: Security Posts

Lessons Learned from Verizon DBiR 2020

Thu, 2020/07/02 - 21:46
Verizon had just released its annual Data Breach Incident Report (DBiR) 2020. It analyzes 32,002…
Categories: Security Posts

"Tap if you can, SPAN if you must."

Thu, 2020/07/02 - 21:46
If you've ever wondered why that piece of advice is fairly common among IT and security…
Categories: Security Posts

Be Confident Stopping Hancitor, Wannacry Internal, & more

Thu, 2020/07/02 - 21:46
Being current is critical in cybersecurity. When attacks spring up you worry if you're protected.…
Categories: Security Posts

US CERTS Top 10 Exploits in the Wild

Thu, 2020/07/02 - 21:46
We love to think about security in terms of dark geniuses with hoodies, face tats and piercings…
Categories: Security Posts

COVID-19 Late Testing a Lesson for Every Network Equipment Manufacturer

Thu, 2020/07/02 - 21:46
I was watching the TED talk by Bill Gates recorded in March 2020 about how humanity should have…
Categories: Security Posts