Cherry Picking Laws, Compliance & Ethics
Introduction There are more similarities than differences between cyber and military attacks. There are more differences in how laws, compliance
Introduction There are more similarities than differences between cyber and military attacks. There are more differences in how laws, compliance
There are multiple posts on the blog about what Volatility is and how to leverage the application tools. This post
This post is about the concept of an attack surface, the attack surface growing in area over time, and applying
Analyzing computer memory on the same computer from which the memory dump was collected can introduce several risks and limitations,
Continue readingRule #1 – Don’t Analyze on the Same Computer From Which You Collected
Why is it Important to Reduce the Dwell Time When Detecting Cyber Threats? Decreasing dwell time in cybersecurity threat detection
In a previous post, I wrote about Volatility and its use in analysis of live streaming of computer memory. In
Analyzing live memory streams can be a powerful technique for detecting cyber threats, especially advanced persistent threats (APTs) and sophisticated
Continue readingAnalysis of Live Memory Streams to Detect Cyberthreats
The fact that cyber security threats often take hundreds of days to detect is a significant challenge for organizations worldwide.
Continue readingDetection Time – Why Hundreds of Days to Detect?
Detecting a cyber security threat involves a multi-layered approach that combines technology, processes, and human expertise. Effective detection strategies are
Detecting cyber threats is a challenging task that requires a blend of technology, expertise, and continuous vigilance. The complexity of