Blog

The Ultimate List Of Cyber Security Gurus You Should Be Following On Twitter

Twitter has become a really great place to find out cyber security information. You can even get insider views on the types of threats as they happen, as well as trends in the cyber security...

Read more...

The Cyber Attack That Was Here Today But Gone Tomorrow

One of the most easily resolved scenarios an analyst can face is when an alert is triggered regarding  an abnormality  on an endpoint, whereupon  initial investigation reveals right off that an...

Read more...

Top Challenges of Incident Response Teams

With cyberattacks becoming increasingly sophisticated in recent years, incident responders are drowning in wave after wave of security alerts with which they must grapple daily. Staying on top of...

Read more...

The IT Man in the Middle

Thoughts on how to increase cooperation between security and IT teams during incident response for a smoother workflow

Read more...

Casinos don’t gamble when it comes to security – why should you?

If you ever set foot in a Las Vegas casino, you’ve probably noticed the unbelievable amount of visible security. From security guards stationed throughout the casino, to the cameras in the...

Read more...

Time to say "Buh Bye" to post-mortem forensics

Sysinternals, sandboxes, EnCase, FTK, Sleuthkit, DFF, IEF, Wireshark, SIFT, CAINE, COFEE, Volatility, custom scripts in various languages, etc. If any of these names, terms and acronyms are...

Read more...

Reputation Intelligence Feeds – the best way to exhaust the SOC

Just like any good buzz term in the security industry, “Reputation Intelligence” spread like wildfire in our community. Many vendors offered a variety of reputation intelligence feeds like IPs,...

Read more...

Traditional EDR solutions are like treating cancer with Aspirin...here is why

"The era of Anti-Virus is over!" was probably the most common sentence uttered in the security world at the beginning of this decade. At the time, you couldn’t get away from terms like “APT” and...

Read more...

3 Questions about Oracle's breach that you are too afraid to ask

Point of Sale data breaches are one of the biggest sources of stolen payment cards for cybercriminals.  Attackers have honed their methods, paving the way for the mega-breaches of Target, Home...

Read more...

Five facts about ransomware that will make you think twice

As we all know, ransomware has quickly emerged as a very dangerous cyberthreat facing organizations worldwide and it has reached a new level of maturity in the past 12 months. Infection numbers...

Read more...

Connect with us

Stay connected

whitepaper banner-280X233.png