Posts

Jeremy Jethro Interview

What have been some areas of focus in recent years?  I have been particularly successful simulating advanced persistent attacks for customers using creative methods to penetrate enterprise networks and make way to the company’s most prized assets. A lot of attention is given to R&D time in a lab where various defensive security technologies are evaluated for weaknesses and adjusting offensive tools accordingly.  Read Full Interview

Security Controls: Best Practice Overview

By Jeremy Jethro of CipherTechs Layer 8 is a term used by IT security consultants that represents the weakest link of most companies: users. While an organization may be secure and employ state-of-the-art security controls at the physical and technical levels, many executive teams management circumscribe operational security (also known as procedural security). To that end, let’s review the three important categories of security controls. Read Full Article