As a relatively new framework, there remains a good deal of confusion around what SASE does and what it wasn’t designed to do. In this post, we’ll take a look at some of the top common misconceptions about SASE and […]
Discover top-tier, integrated cybersecurity solutions designed to protect your business. Stay updated on the latest trends in the cybersecurity landscape and learn how advanced threat intelligence and actionable insights can help you swiftly identify and counter today’s most significant cyber threats. Explore our cybersecurity solutions to unlock efficiencies, automate protection, and neutralize threats with transformative security technology and expert consulting.
As a relatively new framework, there remains a good deal of confusion around what SASE does and what it wasn’t designed to do. In this post, we’ll take a look at some of the top common misconceptions about SASE and […]
In the first post of our SASE series, we outlined some of the specific challenges SASE addresses and why this model for distributed applications and data represents a more unified and streamlined approach for modern IT organizations. Now we will […]
We are living through a sea change in federal technology procurement. This sea change is more than just modernization mandates. It is the mindset shift from purchasing discrete pieces of infrastructure to architecting a platform that arrays many moving parts […]
Executive Summary In April 2016, Microsoft shocked the PC world when it announced the Windows Subsystem for Linux (WSL). WSL is a supplemental feature that runs a Linux image in a near-native environment on Windows, allowing for functionality like command […]
This quarter we have seen some notable cyberattacks that have captured the public’s attention. With consumers more aware of large-scale attacks, organizations have been under immense pressure to avoid being the next headline. As businesses are working to secure a […]
The technology world has a habit of shifting underfoot, faster than many organizations can run. In the wake of the first two blogs in our three-part series on ransomware, the problem has escalated dramatically. In this post, we want to […]
Executive Summary In early June 2021, Black Lotus Labs identified ReverseRat, a remote access trojan (RAT) operated by a suspected Pakistani actor that was targeting government and energy sector organizations in South and Central Asia. After publishing our initial research, […]
This blog was co-written with Mark Ramach, Principal Software Developer. The federal cloud migration is well underway. Additionally, our federal customers are requesting increasing levels of automation via system-to-system interactions. Because of this, our portals and products are becoming increasingly […]
Introduction “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know […]
Introduction Last August, Black Lotus Labs participated in the DEF CON Red Team Village CTF. If that sentence reads as gobbledygook to you, read on as we unpack it. This blog will introduce CTFs and related security concepts, then show […]