Security Control Validation Case Study – When Threat Intelligence and Red Team Get Married As the Cybersecurity industry and the talent pool within it is in such high… June 25, 2019 Read More
Breach and Attack Simulation Tips for RSA 2019 I have been attending RSA for more than 15 years. It’s an intense, long week… February 25, 2019 Read More
Cybersecurity Is Your Gold Disk Putting You at Risk? If your environment security testing plan does not start with your “gold disk,” there is… October 11, 2018 Read More
Security Controls Application Whitelist Bypass This series of posts are not meant to be the latest and greatest of our… May 21, 2018 Read More
Cybercrime How the Experian Data Breach Case Might Change the Protection of Breach Investigation Reports For many of us that attend DFIR meetups and actively track breaches and all that… May 27, 2017 Read More
Ransomware Anatomy of a Ransomware Attack By now, we have realized how lucrative the ransomware business has become for criminals. This… July 7, 2016 Read More