Samantha Cruz is a Cyber Operations Researcher at Horangi specializing in cyber research and security tool development. Before joining Horangi, she has worked for Trend Micro as a security analyst and engineer.
Warden January 2020 Release Notes: New Compliance Standards Supported
We previously released new features to drive automated cloud compliance on Warden. This time, we added two new compliance standards and more ways to action on compliance check results.
Warden Now Supports Compliance: Storyfier October-November 2019 Release Notes
We’re excited to tell you about a new set of features to help you with compliance. Also in this release are the ability to manage vulnerabilities in bulk and export findings.
The Real Cost of Cloud Compliance (or Lack of It)
Gearing up for cloud compliance happens the second you deploy your data to the cloud. Here, we explore what it is, why it matters, and how to make sure your cloud infrastructure is compliant with the latest standards.
August–September 2019 Release Notes: Vulnerability Management Beta
Introducing our newest beta feature — Vulnerability Management. Also in this release — the first look at the CIS Benchmark integrated into Warden findings and a new way to filter your findings.
Storyfier Now Integrated With Slack — Release Notes: June 2019
Our Product Engineering team has been working hard to push out new Storyfier features, improvements and bug fixes. Let’s take a look at what we’ve just released for June. Slack Integration Storyfier is now integrated with your Slack account so you never miss a notification. Once you connect Slack to Storyfier, we will send you regular organization updates so you
Release Notes: May Updates
The Horangi product engineering team has been working hard to push out new features, improvements and bug fixes for the month of May. Let’s take a look at what we’ve just released. Warden is now on AWS Marketplace! First things first, Warden is now available on AWS Marketplace. This is a very big step for us here at Horangi as
Release Notes: Storyfier Updates
We’re excited to introduce to you a new series called Release Notes, where we’ll highlight all the improvements we’ve launched every month, so you can easily stay up-to-date on what’s new. The Horangi product engineering team has been working hard to push out new features, improvements and bug fixes for the past few months. Let’s take a look at what
How to lose money to (credential) stocking stuffers
The last quarter of 2018 has not been the best for companies, as far as cybersecurity is concerned. In December alone, the international hotel chain, Marriott Hotel, experienced a breach that exposed the personal information of as many as 500 million of its customers, including the details of their payment information. Joining the ranks of the unfortunate organizations was the
Hash Lookup Using FileIntel
Why do Hash Lookups? Looking up cryptographic hashes of files is done for various reasons. The first and most common reason is to verify the integrity of a particular file. This is demonstrated in practically every Linux distro download on the web (this is especially vital to prevent headaches arising from corrupted downloads of the ISO file). Another reason to
10 Effective Ways to Boost your Cybersecurity Defenses
“You are your data.” It’s a no-brainer to say that data is an everyday part of an average person’s lifetime. People of all ages and backgrounds are connected to the cybersphere doing things like communicating with others, getting work done, and even having some fun. Technology has evolved and advanced exponentially, enabling people people get things done more easily and...
Protecting Yourself from Social Engineering Attacks
In the realm of cyber security, one thing is clear: the weakest link in any security system is the human being. One can have the most state-of-the-art, bulletproof cybersecurity process in the world, but without understanding the nature of a human being, they are all are moot points once someone unauthorized gets hold of access. In fact, a whole branch
How to Get Away With US$530 Million Worth of Cryptocurrency the Easy Way
Cryptocurrency is, no question, the fastest growing currency in recent years. In fact, the top cryptocurrency exchanges trade as much as US$6.21 billion within 24 hours as of time of writing. In 2017 alone, the value of cryptocurrencies increased by more than 2,700 percent. What used to be a niche market several years ago is now considered as part of
Decoding (Open-source) Intelligence, Part 3: Now What?
In part 1 of this series, we discussed open-source intelligence (OSINT), how it’s being used, and how it can help an organization in their information security operations. In part 2, we discussed a few tools and techniques used to gather open source intelligence and then some examples of analysis to make sense of the information collected. In the next and
Decoding (Open-source) Intelligence, Part 2: Tools of the Trade
In part 1 of this series, we discussed open-source intelligence (OSINT), how it’s being used, and how it can help an organization in their information security operations. In this part will be discussing a few tools and techniques used to gather open source intelligence and then some examples of analysis to make sense of the information collected. Polish Your Google-Fu
Decoding (Open-source) Intelligence, Part 1: The Big Picture
For a lot of people, information security in an organization all happens under the hood. At the user-level there may be distinguishable common practices like looking for signs of phishing, securing accounts with strong passwords and 2 factor authentication. The rest of the stuff is best left to the IT Security people. During a casual search, one might find themselves