Student of Cyber Security
I have seen a number of posts from folks seeking information of how to best enter the cyber-security field. Folks
I have seen a number of posts from folks seeking information of how to best enter the cyber-security field. Folks
Different Purposes Live computer memory analysis and malware or anti-virus applications serve different purposes in the realm of cybersecurity. Key
Continue readingLive Analysis of Computer Memory Versus Anti-Virus Program
“Loose lips sink ships” was a slogan used during World War II as part of a propaganda campaign to remind
Maltego, MISP (Malware Information Sharing Platform), and OpenCTI (Open Cyber Threat Intelligence) are all powerful cybersecurity tools, but they serve
Introduction “The NIST (National Institute of Standards and Technology) has developed a comprehensive standard for incident response called NIST Special
What is Hofstede? “Hofstede included six key aspects of national culture country comparison scales, including: the power distance index (PDI), individualism vs. collectivism
This post is about factors involved in forming a cyber-criminal, and why understanding those factors are key in thwarting cyber-attacks.
Continue readingSTEMPLES – Defining and Understanding the Attacker
For this post, I will reference the platform MISP. Bing defines MISP as: “The MISP (Malware Information Sharing Platform) is an open-source