Blogs

Security Response Attack Investigation Team
FeaturedPosted: 8 Min Read

Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak

Windows zero day was exploited by Buckeye alongside Equation Group tools during 2016 attacks. Exploit and tools continued to be used after Buckeye's apparent disappearance in 2017.

Video
Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak
Giampiero NanniCIPP/E, CIPM - Government Affairs EMEA
FeaturedPosted: 10 Min Read

Avoiding Your Worst GDPR Nightmare

Compliance should not lead to complacency

Avoiding Your Worst GDPR Nightmare
Trevin EdgeworthSr Director, Offensive Security Operations
FeaturedPosted: 4 Min Read

10 Ground Rules for Red Teams

An effective Red Team offers huge value to your defensive strategy, but you have to be prepared to face up to some hard truths

10 Ground Rules for Red Teams
Tess HetzelCorporate Responsibility Manager
FeaturedPosted: 4 Min Read

Identity Theft Can Last a Lifetime

Symantec won’t let foster youth face identity theft alone

Identity Theft Can Last a Lifetime
Ian KudzinowskiSenior Employment Coordinator
FeaturedPosted: 3 Min Read

You Can Always Rely on the Gay Community

Moving away from everything you know can be scary. Ian K. shares his experience of moving from his lifelong hometown to a new city, being welcomed by the locals, and the lessons we can all learn to create inclusive cultures.

You Can Always Rely on the Gay Community