A Deep Dive into CyberArk’s Central CredentialProvider (CCP) Introduction Hardcoded credentials are still among the most critical and overlooked security flaws in modern software development. From leaked Git repos to reverse-engineered binaries, static passwords are easy targets. They also make rotation and access control almost impossible. Enter CyberArk’s Central Credential Provider (CCP): a secure, centralized … Continue reading Stop Hardcoding Passwords
Tag: automation
Scaling your threat hunting operations with CrowdStrike and PSFalcon
Introduction Most modern day EDRs have some sort of feature which allows blue teamers to remotely connect to hosts with an EDR agent/sensor installed, to aid in their investigation of incidents. In CrowdStrike, this is called Real Time Response, and it provides a wide range of capabilities, from executing built-in commands like ipconfig and netstat … Continue reading Scaling your threat hunting operations with CrowdStrike and PSFalcon
Introducing BitSight Automation Tool
Glossary Introduction BitSight Automation Operations Structure Installation Prerequisites Configuration Generating an API key for your BitSight account Adding the API Key to the BitSight Automation Tool Windows Linux The group_mapper.json file The guid_mapper.json file Configuring your Company's structure The groups.conf file Letting BitSight Automation Tool handle the rest Binding into Executable Execution Usage Use Cases … Continue reading Introducing BitSight Automation Tool



