copy and paste this google map to your website or blog!
Press copy button and paste into your blog or website.
(Please switch to 'HTML' mode when posting into your blog. Examples: WordPress Example, Blogger Example)
How does a compromised home router change the threat model? How does this control over settings translate into a change in the threat model? Much of our research has to do with reframing concepts that seem obvious through the lens of the attacker For example, because the AP controls DNS lookups, it can influence where connections from the endpoints go Because the AP controls routing, it can influence how traffic flows to the enterprise network, and
RSA 2021: The router of all evil - Orange Cyberdefense How vulnerable home-routers can compromise corporate security A major new element we need to consider since our workforce is connecting remotely is the security of the user’s home router A totally new set of threats, risks and potential compromises is introduced by vulnerable or misconfigured home routers And the traditional network security controls we’re currently using to protect
The 10-Year Security Plan: Why SASE is the Future of . . . The future of security starts now The cyber threat landscape is evolving at an unprecedented pace Businesses operating across multiple regions must adapt or risk falling behind In today’s time firewalls and VPNs are doing exactly that, falling behind
BlackHat Insecure remote access - Orange Cyberdefense On this page, we will share research we conducted into the efficacy of commercial Secure Remote Access (or ‘VPN’) solutions in the face of modern mobile worker use cases, typical endpoint technologies, and contemporary threat models As millions of users worldwide work from home and depend on VPN technologies to access corporate systems and data, we explore the question of security for
The shift to home working and its implications. Charl van der Walt Technical thought leader, spokesman and figurehead for Orange Cyberdefense world-wide, leading and managing the Security Research Center – a specialist security research unit We identify, track, analyze, communicate and act upon significant developments in the security landscape