Knowledge sharing

We believe knowledge sharing is vital to increase the domain knowledge within cyber security while also challenging our own opinions and established practices. The format of our knowledge sharing varies in different formats and technical depth, from our podcast and video blog, to technical content on securing cloud and managing risk.

Our consultants are experienced public speakers and lecturers. You may inquire for a private presentation or workshop.

Post image
Podcast
S04E02 - Thomas Baasnes fra Verdane

Beskrivelse: I andre episode av sesong fire snakker vi med Thomas Baasnes fra Verdane om hvordan man undersøker cyber security modenheten til selskaper man vurderer å investere i, samt hvordan de som investor hjelper selskapene de investerer i med å lykkes innenfor cyber security, Level: 100 Kilder som nevnes/anbefales: – https://www.o3c.no/ Medvirkende: - Olav Østbye, O3 CYBER - Håkon Nikolai Stange Sørum, O3 CYBER - Thomas Baasnes, Verdane  Følg oss! – https://www.linkedin.com/company/O3CYBER – https://twitter.com/O3CYBER – https://www.youtube.com/channel/UCioc25HRY1lSqXcwloFvIyA  Ris og ros? Gi oss gjerne en tilbakemelding, både positive og forbedringspotensiale. Dette kan du gjøre via kontakt oss på nettsiden vår, O3C.no Forslag til nye episoder? Skulle du ha noen ønsker/forslag til nye episoder så ta gjerne kontakt med oss med oss via nettsiden vår, O3C.no

Listen to episode
Post image
Article
Start manual, move towards automation and tooling

Application and software security is paramount for any organization creating custom applications, especially if these applications are customer-facing and/or process sensitive data. For some reason we often see that when an organization is ready to tackle the security aspects of their own applications there is a tendency to start looking into procuring third party security software. We believe this is a sub-optimal approach.

Read article ->
Post image
Article
Tool Release: Azure Security Survival Kit

One of the ways we will seek to support the community is by openly sharing the tools we use to help organizations become resilient. The Azure Security Survival Kit is the first tool built by O3 Cyber that we are ready to share with the community.

Read article ->
Post image
Podcast
S04E01 - DNB

Beskrivelse: I første episode av sesong fire snakker vi med Johanne Bettum og Fredrik Svendsen om DNB sitt Greenhouse (Graduate) program og om hvordan DNB jobber med cyber security internt.  Level: 100 Kilder som nevnes/anbefales: – https://www.o3c.no/ Medvirkende: - Olav Østbye, O3 CYBER - Håkon Nikolai Stange Sørum, O3 CYBER - Johanne Bettum, DNB - Fredrik Svendsen, DNB Følg oss! – https://www.linkedin.com/company/O3CYBER – https://twitter.com/O3CYBER – https://www.youtube.com/channel/UCioc25HRY1lSqXcwloFvIyA  Ris og ros? Gi oss gjerne en tilbakemelding, både positive og forbedringspotensiale. Dette kan du gjøre via kontakt oss på nettsiden vår, O3C.no Forslag til nye episoder? Skulle du ha noen ønsker/forslag til nye episoder så ta gjerne kontakt med oss med oss via nettsiden vår, O3C.no

Listen to episode
Post image
Article
Cloud Security Seminar

O3 Cyber invites you to Deichman Bjørvika for our first ever Cloud Security Seminar. The seminar starts at 12:00 and ends at 15:30. Following the event we are hosting a get-together at Hammerhai to keep the good conversations going. We have set aside plenty of time for discussion and networking in the breaks between the presentations. Language of the talks is specified in the program. We only have 150 spots, so first come, first served. If you have booked a ticket but cannot attend, please cancel it so others can get your spot.

Read article ->
Post image
Article
Abusing TCP tunneling in Azure Bastion

Native client support is a fairly new feature in Azure Bastion, which allows users to use native SSH and RDP programs to connect to Bastion instead of using the Azure Bastion web interface. In this article, we explore how Azure Bastion Native Client support works, and how an adversary could abuse this feature to perform attacks against Azure VMs over private IP addresses, without having direct network connectivity to the VM.

Read article ->