A four step process for creating a defensible security architecture.
Watch more videos on my YouTube channel.
A four step process for creating a defensible security architecture.
Watch more videos on my YouTube channel.
Red Team tools exist for PowerShell. Older ones, like PoshSec and PowerSploit, and newer ones like PowerShell Empire. Meantime, criminals weaponized PowerShell scripts with malware like PowerSniff and PowerWare. So in this talk, we discuss monitoring PowerShell and integrating it with incident response.
Watch more videos on my YouTube channel.
Someone infiltrated the Locky network and disabled the ransomeware. We’ve seen this happen before. Turns out, the criminals make as many mistakes as we do. And this means we have a fighting chance.
Watch more videos on my YouTube channel.
If data is the life blood of the organization, then data exchange is the steady heartbeat. Data in, data out (beat). Data in, data out (beat). And encryption protects that flow.
Watch more videos on my YouTube channel.
PDCA, Plan-Do-Check-Act, is all fine and good. The trouble is delaying feedback. So here’s some ways to get implementation and assessment teams closer to tighten the feedback loop.
Watch more videos on my YouTube channel.
Content management systems are an oft used system for criminals. A toy manufacturer provides a recent example, as their unpatched Joomla system was hijacked to distribute ransomeware with Angler.
Watch more videos on my YouTube channel.
After last week’s video on phishing response metrics, a question came in. How does IT respond and clean up phishing emails?
Watch more videos on my YouTube channel.