Name Resolution

How often to DFIR analysts think about name resolution, particularly on Windows systems?  I know that looking back across engagements I’ve done in the past, I’ve asked for DNS server logs but very often, these were not available. I’m sure others h… Continue reading Name Resolution

Posted in Uncategorized

Monitoring and Vulnerability Management

 (Cross posted from the Securonix Blog)
Vulnerability management is one of the most basic security hygiene practices organizations must have in place to avoid being hacked. However, even being a primary security control doesn’t make it simple to succes… Continue reading Monitoring and Vulnerability Management