Student of Cyber Security
I have seen a number of posts from folks seeking information of how to best enter the cyber-security field. Folks
I have seen a number of posts from folks seeking information of how to best enter the cyber-security field. Folks
Different Purposes Live computer memory analysis and malware or anti-virus applications serve different purposes in the realm of cybersecurity. Key
Continue readingLive Analysis of Computer Memory Versus Anti-Virus Program
Maltego, MISP (Malware Information Sharing Platform), and OpenCTI (Open Cyber Threat Intelligence) are all powerful cybersecurity tools, but they serve
What is Hofstede? “Hofstede included six key aspects of national culture country comparison scales, including: the power distance index (PDI), individualism vs. collectivism
This post is about factors involved in forming a cyber-criminal, and why understanding those factors are key in thwarting cyber-attacks.
Continue readingSTEMPLES – Defining and Understanding the Attacker