In the first post of our SASE series, we outlined some of the specific challenges SASE addresses and why this model for distributed applications and data represents a more unified and streamlined approach for modern IT organizations. Now we will […]
In the first post of our SASE series, we outlined some of the specific challenges SASE addresses and why this model for distributed applications and data represents a more unified and streamlined approach for modern IT organizations. Now we will […]
We are living through a sea change in federal technology procurement. This sea change is more than just modernization mandates. It is the mindset shift from purchasing discrete pieces of infrastructure to architecting a platform that arrays many moving parts […]
Executive Summary In April 2016, Microsoft shocked the PC world when it announced the Windows Subsystem for Linux (WSL). WSL is a supplemental feature that runs a Linux image in a near-native environment on Windows, allowing for functionality like command […]
This quarter we have seen some notable cyberattacks that have captured the public’s attention. With consumers more aware of large-scale attacks, organizations have been under immense pressure to avoid being the next headline. As businesses are working to secure a […]
The technology world has a habit of shifting underfoot, faster than many organizations can run. In the wake of the first two blogs in our three-part series on ransomware, the problem has escalated dramatically. In this post, we want to […]
Executive Summary In early June 2021, Black Lotus Labs identified ReverseRat, a remote access trojan (RAT) operated by a suspected Pakistani actor that was targeting government and energy sector organizations in South and Central Asia. After publishing our initial research, […]
This blog was co-written with Mark Ramach, Principal Software Developer. The federal cloud migration is well underway. Additionally, our federal customers are requesting increasing levels of automation via system-to-system interactions. Because of this, our portals and products are becoming increasingly […]
Introduction “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know […]
Introduction Last August, Black Lotus Labs participated in the DEF CON Red Team Village CTF. If that sentence reads as gobbledygook to you, read on as we unpack it. This blog will introduce CTFs and related security concepts, then show […]
By delivering the fastest, most secure platform for applications and data to help businesses, government and communities deliver amazing experiences, Lumen plays a critical role in the communications and technology ecosystem that can help protect the cybersecurity of all things. […]