A Persona
Just a quick update from Lu. In a previous post, I wrote about leveraging a chat bot to shorten dwell
Just a quick update from Lu. In a previous post, I wrote about leveraging a chat bot to shorten dwell
Belgian Mal <->Incident Response<->Chat Bot My name is Lu. My breed is Belgian Malinois. if you have ever watched a
How to Level the Playing Field Why is access to a computer, laptop,tablet, cell phone and Internet access so important
What is Volatility3? Volatility3 is an advanced memory forensics framework used for extracting digital artifacts from volatile memory (RAM) dumps.
Knowledge Graphs and Volatility Introduction The goal of this post is to show how knowledge graphs can be used to
Analyzing live memory streams can be a powerful technique for detecting cyber threats, especially advanced persistent threats (APTs) and sophisticated
Continue readingAnalysis of Live Memory Streams to Detect Cyberthreats
Introduction From CoPilot: “The F3EAD framework is an alternative intelligence cycle commonly used within Western militaries for operations that typically
Continue readingF3EAD – Infusing Real Time Intel Into the Operational Flow
Back in the day, way back, there were groups of folks tagged as Cro-Magnon. These folks understood kinetic warfare –
There are differing opinions on where AI/ML solutions are and where humans are as far as being able to accomplish
A more detailed explanation can be found in the document SP 800-207. Identity – The New Perimeter From NIST —