About Soteria

This author has not yet filled in any details.
So far Soteria has created 4 blog entries.

Surviving a Cyber Security Incident – Part 1

By: Matthew Otte Part 1 — Before the Storm Throughout their many years of practice, Soterians have advised for, participated in, and commanded a large assortment of cyber security incident responses (IRs) in the form of both exercises and real-world events. Though no two response efforts are exactly alike, Soteria has discovered a pattern of common pitfalls [...]

Surviving a Cyber Security Incident – Part 12022-03-30T13:07:30+00:00

Understanding MDR

By: David S. MANAGE. DETECT. RESPOND. In any organization that uses computers to manage or operate their business, there is inherent risk of a cyber incident. The level of risk can vary based on the structure of systems, controls in place, the storage or transfer of sensitive information (e.g. financial, personal, health, or intellectual property), [...]

Understanding MDR2022-03-14T16:19:39+00:00

Another Look At Active Directory Security

By Carl L Active Directory is the backbone of most organizations, and compromising this tool is the Holy Grail for most attackers. Any organization that has been around for a while has likely been through many iterations of Active Directory. Over the years they may have seen hundreds or thousands of different recommendations, upgrades, [...]

Another Look At Active Directory Security2022-01-18T16:59:11+00:00

Azure AD Default Configuration Blunders

By: Carl L Following the release of two recent blogs regarding Microsoft’s Azure Active Directory default configurations, we began digging a little further into the access an unprivileged user has inside any tenant running any of the default settings in their tenant. What we’ve found is that the Default Enabled settings allow any unprivileged, authenticated user [...]

Azure AD Default Configuration Blunders2022-03-30T00:40:54+00:00
Go to Top