Shorten the Detection Time for Threats to Increase the Success of the Cybersecurity workflow
Knowledge Graphs and Volatility Introduction The goal of this post is to show how knowledge graphs can be used to
Knowledge Graphs and Volatility Introduction The goal of this post is to show how knowledge graphs can be used to
There are multiple posts on the blog about what Volatility is and how to leverage the application tools. This post
This post is about the concept of an attack surface, the attack surface growing in area over time, and applying
Analyzing computer memory on the same computer from which the memory dump was collected can introduce several risks and limitations,
Continue readingRule #1 – Don’t Analyze on the Same Computer From Which You Collected
Why is it Important to Reduce the Dwell Time When Detecting Cyber Threats? Decreasing dwell time in cybersecurity threat detection
In a previous post, I wrote about Volatility and its use in analysis of live streaming of computer memory. In
The fact that cyber security threats often take hundreds of days to detect is a significant challenge for organizations worldwide.
Continue readingDetection Time – Why Hundreds of Days to Detect?
Detecting a cyber security threat involves a multi-layered approach that combines technology, processes, and human expertise. Effective detection strategies are
Detecting cyber threats is a challenging task that requires a blend of technology, expertise, and continuous vigilance. The complexity of
I watched a movie on Netflix named “The Gentlemen“. There is a line in the movie repeated a couple of