Knowledge Center

Use Case: Security Red Teams
Cybersecurity Red Teams play the role of attacker/adversary in cybersecurity wargames. They play the bad guys to help sharpen the skills and toolset of the good guys (the Blue Team). Some companies will maintain an in-house Red Team, and some will contract that roll out to consultants. In order to simulate attacks on the friendly target company, the red team has to maintain much of the same attack infrastructure as threat actors.

REPORT: Who’s Who In Ransomware: 2022 Report
There are many ways to protect yourself and your organization against ransomware, but for many businesses, it’s not a case of if, but rather when, a cyberattack or breach occurs. The core premise of ransomware remains the same, however the sophistication of today’s attacks is now far more damaging and financially devastating to businesses. This report will provide a window into the organized gangs who plan and execute attacks and their tactics.

INFOGRAPHIC: Common Types of Vulnerabilities
In the past year, vulnerability exploitation, as the entry point of threat actors, has doubled. To find these vulnerabilities, threat actors are leveraging a wide variety of techniques, including scanning IPs and open ports, crawling for specific services, testing specific CVEs from the catalog discussed above, and running remote code execution.

INFOGRAPHIC: Empower Employees From Being the Weakest Link
Oftentimes, humans are referred to by organizations as the weakest link to their cybersecurity strategy, but this does not have to be the case! It is your responsibility as an organization to enable your employees to be a part of the cybersecurity mission. Check out our latest infographic to learn how to turn your employees into the strongest link!

Use Case: Security Red Teams
Cybersecurity Red Teams play the role of attacker/adversary in cybersecurity wargames. They play the bad guys to help sharpen the skills and toolset of the good guys (the Blue Team). Some companies will maintain an in-house Red Team, and some will contract that roll out to consultants. In order to simulate attacks on the friendly target company, the red team has to maintain much of the same attack infrastructure as threat actors.

REPORT: Who’s Who In Ransomware: 2022 Report
There are many ways to protect yourself and your organization against ransomware, but for many businesses, it’s not a case of if, but rather when, a cyberattack or breach occurs. The core premise of ransomware remains the same, however the sophistication of today’s attacks is now far more damaging and financially devastating to businesses. This report will provide a window into the organized gangs who plan and execute attacks and their tactics.

INFOGRAPHIC: Common Types of Vulnerabilities
In the past year, vulnerability exploitation, as the entry point of threat actors, has doubled. To find these vulnerabilities, threat actors are leveraging a wide variety of techniques, including scanning IPs and open ports, crawling for specific services, testing specific CVEs from the catalog discussed above, and running remote code execution.

INFOGRAPHIC: Empower Employees From Being the Weakest Link
Oftentimes, humans are referred to by organizations as the weakest link to their cybersecurity strategy, but this does not have to be the case! It is your responsibility as an organization to enable your employees to be a part of the cybersecurity mission. Check out our latest infographic to learn how to turn your employees into the strongest link!

Use Case: Security Red Teams
Cybersecurity Red Teams play the role of attacker/adversary in cybersecurity wargames. They play the bad guys to help sharpen the skills and toolset of the good guys (the Blue Team). Some companies will maintain an in-house Red Team, and some will contract that roll out to consultants. In order to simulate attacks on the friendly target company, the red team has to maintain much of the same attack infrastructure as threat actors.

REPORT: Who’s Who In Ransomware: 2022 Report
There are many ways to protect yourself and your organization against ransomware, but for many businesses, it’s not a case of if, but rather when, a cyberattack or breach occurs. The core premise of ransomware remains the same, however the sophistication of today’s attacks is now far more damaging and financially devastating to businesses. This report will provide a window into the organized gangs who plan and execute attacks and their tactics.

INFOGRAPHIC: Common Types of Vulnerabilities
In the past year, vulnerability exploitation, as the entry point of threat actors, has doubled. To find these vulnerabilities, threat actors are leveraging a wide variety of techniques, including scanning IPs and open ports, crawling for specific services, testing specific CVEs from the catalog discussed above, and running remote code execution.
Do you want to stay in the know?
Subscribe to get updates and new information about Conceal as they become available.