Ethics and Chat
I watched a movie on Netflix named “The Gentlemen“. There is a line in the movie repeated a couple of
Reducing Threat Detection Time Through Automation
I watched a movie on Netflix named “The Gentlemen“. There is a line in the movie repeated a couple of
In previous posts, I made references to a “live” memory analysis tool named Volatility. The concept is both logical and
There is not a day that passes by, that I don’t receive a dozen or more posts on how to
I have seen a number of posts from folks seeking information of how to best enter the cyber-security field. Folks
Different Purposes Live computer memory analysis and malware or anti-virus applications serve different purposes in the realm of cybersecurity. Key
Continue readingLive Analysis of Computer Memory Versus Anti-Virus Program
“Loose lips sink ships” was a slogan used during World War II as part of a propaganda campaign to remind
Maltego, MISP (Malware Information Sharing Platform), and OpenCTI (Open Cyber Threat Intelligence) are all powerful cybersecurity tools, but they serve
Introduction “The NIST (National Institute of Standards and Technology) has developed a comprehensive standard for incident response called NIST Special
What is Hofstede? “Hofstede included six key aspects of national culture country comparison scales, including: the power distance index (PDI), individualism vs. collectivism
This post is about factors involved in forming a cyber-criminal, and why understanding those factors are key in thwarting cyber-attacks.
Continue readingSTEMPLES – Defining and Understanding the Attacker