The Distinctive Worlds of OT Cybersecurity and IT Cybersecurity
A blog about the differences between OT and IT cybersecurity. Continue reading The Distinctive Worlds of OT Cybersecurity and IT Cybersecurity
Collaborate Disseminate
A blog about the differences between OT and IT cybersecurity. Continue reading The Distinctive Worlds of OT Cybersecurity and IT Cybersecurity
A blog about building a cloud security flywheel. Continue reading Building a Cloud Security Flywheel: Lessons from the Field
A blog about how AI and ML are changing mobile device forensics investigations Continue reading How AI and ML are Changing Mobile Device Forensics Investigations
Explore the key findings from the 2024 SANS | GIAC Cyber Workforce Research Report on cybersecurity workforce management. Continue reading Unveiling the 2024 SANS | GIAC Cyber Workforce Research Report: Building and Sustaining Mid-Level Cybersecurity Roles
A blog about deploying multi factor authentication. Continue reading Deploying Multi Factor Authentication – The What, How, and Why
A blog about industrial control system incident response. Continue reading Insane Incident Incursion Recursion: Mastering Incident Response Reporting Regulations
We are excited to announce the latest update to the SANS Institute’s FOR585: Smartphone Forensic Analysis In-Depth! Continue reading Spring 2024 Update: Explore the Latest Enhancements to SANS FOR585: Smartphone Forensic Analysis In-Depth
We are excited to announce the latest update to the SANS Institute’s FOR585: Smartphone Forensic Analysis In-Depth! Continue reading Spring 2024 Update: Explore the Latest Enhancements to SANS FOR585: Smartphone Forensic Analysis In-Depth
A blog about NIS2 compliance. Continue reading The Ripple Effect: NIS2’s Impact on Cybersecurity Practices Across the EU
When approaching incident response in an environment you may not be very familiar with, the biggest challenge is often knowing what to look for. This is especially true when you’re facing dozens of data sources with hundreds of event types. As an incid… Continue reading Following the Trail of Threat Actors in Google Workspace Audit Logs