CareersContact
Home

INSIGHTS

< BLOG / >

Quickly Triage BloodHound Data With AD-RECON From BreakPoint Labs

AD-RECON is a new tool developed by BreakPoint Labs to quickly triage BloodHound data to identify potential attack paths and [...]
READ MORE ›

ABUSING ACTIVE DIRECTORY: DOWN THE RABBIT HOLE WE GO

This is the first blog post of many in a series to expand on common ways we take over client [...]
READ MORE ›

The Importance of Women in Cybersecurity: Finding and Providing a More Inclusive Space

A 2022 report by Cybersecurity Ventures reflects that women represent 25% of the global cybersecurity workforce.1 While this number has [...]
READ MORE ›

DevSecOps: Processing Pipelines and Automation 

As technology advances, so do the threats and vulnerabilities that come with it. Now more than ever, security is a [...]
READ MORE ›

Actionable Steps Towards Implementing a Zero Trust Architecture

Your quick reference guide to align enterprise cybersecurity with DoD’s shift to Zero Trust  Since its inception in 2010, Zero [...]
READ MORE ›

Breakpoint Labs Guide to DevSecOps Automation

Solutions for Orchestrating Infrastructure and Services  Combining the capabilities of Ansible and GitLab gives you an excellent infrastructure automation solution [...]
READ MORE ›

Cybersecurity Concerns for Ancillary Strength Control Subsystems

Additive manufacturing (AM) engineers have been incredibly creative in developing ancillary systems that modify a printed parts mechanical properties.  These [...]
READ MORE ›

AM Botnet as a Vector for Energy Market Manipulation

The Federal Energy Regulatory Commission (FERC) reported 16 potential market manipulation cases in 2018.  The 1990’s saw a restructuring of [...]
READ MORE ›

Building Trust in AI Manufacturing Systems with BISON

To extract the greatest value from advanced manufacturing, a shift to codesign with AI is needed to realize the full [...]
READ MORE ›

Proactive Defense: Preparing for Cyber Threats in Additive Manufacturing

As additive manufacturing (AM) matures and continues to gain popularity, it becomes an increasingly attractive target for cyberattacks. Therefore, being [...]
READ MORE ›

Prints, Piracy, and Protection: Safeguarding 3D IP

The growing accessibility of 3D printers and downloadable models online has made it easier than ever to produce products and [...]
READ MORE ›

Adding a “Dimension” to Swatting

Imagine you are a hobbyist 3D printer who has not considered the cybersecurity concerns of your connected additive devices.  You [...]
READ MORE ›

SCHEDULE A FREE CYBERSECURITY ASSESSMENT CONSULTATION

Contact
chevron-down