Shorten the Detection Time for Threats to Increase the Success of the Cybersecurity workflow
Knowledge Graphs and Volatility Introduction The goal of this post is to show how knowledge graphs can be used to
Knowledge Graphs and Volatility Introduction The goal of this post is to show how knowledge graphs can be used to
Analyzing computer memory on the same computer from which the memory dump was collected can introduce several risks and limitations,
Continue readingRule #1 – Don’t Analyze on the Same Computer From Which You Collected
In a previous post, I wrote about Volatility and its use in analysis of live streaming of computer memory. In
Analyzing live memory streams can be a powerful technique for detecting cyber threats, especially advanced persistent threats (APTs) and sophisticated
Continue readingAnalysis of Live Memory Streams to Detect Cyberthreats
In previous posts, I made references to a “live” memory analysis tool named Volatility. The concept is both logical and
There is not a day that passes by, that I don’t receive a dozen or more posts on how to
I have seen a number of posts from folks seeking information of how to best enter the cyber-security field. Folks