RMRF Blog

Get in touch with us

5 Steps to Protect Privileged Users from Compromising

Olga Pasko
January 2019 — 536 views Endpoint Security IAM Identity Governance PAM

OWASP Kyiv Summer 2018 Meetup

Irina Tolochko
July 2018 — 888 views conference Digital forensics incident response security baseline

ShadowThreat Initial Intrusion

Olga Pasko
June 2018 — 653 views APT Cyberthreat Digital forensics ShadowThreat