Detection Time – Why Hundreds of Days to Detect?
The fact that cyber security threats often take hundreds of days to detect is a significant challenge for organizations worldwide.
Continue readingDetection Time – Why Hundreds of Days to Detect?
The fact that cyber security threats often take hundreds of days to detect is a significant challenge for organizations worldwide.
Continue readingDetection Time – Why Hundreds of Days to Detect?
Detecting a cyber security threat involves a multi-layered approach that combines technology, processes, and human expertise. Effective detection strategies are
Detecting cyber threats is a challenging task that requires a blend of technology, expertise, and continuous vigilance. The complexity of
I watched a movie on Netflix named “The Gentlemen“. There is a line in the movie repeated a couple of
I have seen a number of posts from folks seeking information of how to best enter the cyber-security field. Folks
Different Purposes Live computer memory analysis and malware or anti-virus applications serve different purposes in the realm of cybersecurity. Key
Continue readingLive Analysis of Computer Memory Versus Anti-Virus Program
Maltego, MISP (Malware Information Sharing Platform), and OpenCTI (Open Cyber Threat Intelligence) are all powerful cybersecurity tools, but they serve
What is Hofstede? “Hofstede included six key aspects of national culture country comparison scales, including: the power distance index (PDI), individualism vs. collectivism
This post is about factors involved in forming a cyber-criminal, and why understanding those factors are key in thwarting cyber-attacks.
Continue readingSTEMPLES – Defining and Understanding the Attacker