“Credential Theft” or “Credential Reuse” attack techniques are the biggest known threats to Active Directory environments. This can be attributed to significant advances in and broad distribution of attack and reconnaissance tools such as mimikatz or Bloodhound. This means that after the first system in an environment is compromised it often takes less than 48 hours for a complete compromise of an Active Directory but unfortunately typically 8 to 9 months until the attack is discovered. Continue reading “TROOPERS19 Training Teaser: Hardening Microsoft Environments”
Continue readingTag: TROOPERS
Secure CI/CD Pipelines @Troopers ’19
In the last couple of months we participated in an increasing count of customer projects following current trends of agile software development approaches and corresponding toolstacks. Especially the terms Continuous Integration and Continuous Delivery kept (and still keep) popping up on every corner. The frameworks and processes behind those two hypes aid developing software at higher quality in shorter release cycles. This is especially relevant since end consumers nowadays expect fast releases including the newest features. If companies neglect this demand, competitors might take advantage of their better time-to-market which might result in increased market share and -dominance. A lot of changes are happening in the space of CI/CD. Existing tools become more mature, gaining increased attention, and new ones are appearing every month including better ways of integrating them into existing or new processes. Companies benefit from more choices, increased flexibility, and faster integration into existing company policies.
Continue reading “Secure CI/CD Pipelines @Troopers ’19”
Continue readingCatching fire with Docker, DevOps & Security in Enterprise Environments
Docker has become the go-to technology in enterprise- and DevOps contexts. Yet, before mastering a skill, there is the thumb rule: one must learn the basics to have solid fundament before building a house on top. Continue reading “Catching fire with Docker, DevOps & Security in Enterprise Environments”
Continue readingBlackhoodie at TROOPERS19
We are going to have a Blackhoodie event at Troopers 2019 on March 18th and 19th in Heidelberg. With a very exciting event last year, we have decided to roll it once again during Troopers.
Continue reading “Blackhoodie at TROOPERS19”
Continue readingAnd Five Talks More Were Accepted at TROOPERS19!
And five talks more were chosen for TROOPERS19! It sounds like it is going to be the best year ever again…
Follow us on Twitter (@WEareTROOPERS) for more information and do not hesitate to use our hashtag #TR19 when you have questions or remarks about TROOPERS19!
Your TROOPERS Team Continue reading “And Five Talks More Were Accepted at TROOPERS19!”
Continue readingFirst Talks of TROOPERS19 Accepted!
TROOPERS18 was the best year ever (did you check our archives?) and it will be challenging to do better… However, we accept the challenge!
The trainings and talks were from high quality and choices were difficult to make… We hope you will enjoy reading these little teasers!
Follow us on Twitter (@WEareTROOPERS) for more information and do not hesitate to use our hashtag #TR19 when you have questions or remarks about TROOPERS19!
With that being said, we are excited to introduce the first official five talks of TROOPERS19! Continue reading “First Talks of TROOPERS19 Accepted!”
Continue readingTROOPERS18 Photos online!
We are very excited to publish some (more to come!) of our photos from TROOPERS18! Based on feedback from #TR18 we would also like to take a moment for our official TROOPERS photographer to introduce himself and tell you a little about what inspires him.
Continue reading “TROOPERS18 Photos online!”
Continue reading#TR18 Defense & Management Summaries
This blogpost contains summaries of talks from this year’s TROOPERS18 Defense & Management Track.
Continue reading “#TR18 Defense & Management Summaries”
Continue reading#TR18 Attack & Research Summaries
This blogpost contains summaries of talks from this year’s TROOPERS18 Attack & Research Track.
Continue reading “#TR18 Attack & Research Summaries”
Continue reading#TR18 SAP Security Summaries
This blogpost contains summaries of talks from this year’s TROOPERS18 SAP Security Track.
Continue reading “#TR18 SAP Security Summaries”
Continue reading