Have you been hit? CyberDefenses can help.

Blog

Digital Forensics

Categories

Archives

Assessments, the “sine qua non” of Security

by Monty St John Who’s gone to the doctor? Okay, raise your hands… wait — put them down, I can’t see them anyway. Why did you go to the doctor? Was it an annual checkup or did an event happen in life that prompted a check of your health?   More likely than not an…

Read More

Decisions–Under the Microscope, in the Spotlight–Blinding Your Eyes to the Bigger Picture

by Monty St John As humans go, it doesn’t take us long to form an opinion or make a decision.  We go with our gut an astonishing amount of times.  Reflection, when done, seems to give unprecedented weight to the smallest of facts that resonate.  In fact, Daniel Kahneman, a psychologist that won the Nobel…

Read More
CyberDefenses - User Data

More Organizations Are Recognizing the Seriousness of Cyber Threats and the Military Could Have the Answers

By Damon Fleury While the threat of cyber attacks is nothing new, the realization that a major attack could happen to any business, regardless of size or industry, is taking up increasing space on leadership radars. As companies collect more data and deepen dependence on digital networks and systems, all organizations fall into the category…

Read More
CyberDefenses - Incident Review

The Military-Grade Difference in Incident Response

by Brian Engle In support of an overarching information security program, a resilient, sustained incident response program comes from the organization developing the capability in conjunction with the incident response program. The incident response program involves activities that occur in advance of an actual incident event with the goal of ensuring that the organization is…

Read More
CyberDefenses - Crime Scene

The Tao of Investigation

by Daniel Cohen The tent-pole show ‘Law and Order’ ran on NBC for twenty years. Its durability made it the longest-running crime drama in American primetime television history. It was so successful that it spun off multiple successful times, creating SVU, Criminal Intent, and Trial by Jury. The original ran for 456 episodes (with re-runs…

Read More
CyberDefenses - Ninja

The Four Cyber Ninjas

(Based on the four villains from Decisive: How to Make Better Choices in Life and Work, by Chip and Dan Heath). by Daniel Cohen No one wants to make the wrong choice. And not only because of possible repercussions like losing a job, mucking up a relationship, or creating a situation that will require months…

Read More
CyberDefenses - Robot

From Cyber Fiction to Cyber Fact

by Dan Cohen Technology follows the imagination. It’s always been that way. The great leaps in tech (civilian, military, or intelligence sectors) are never entirely accidental. Someone somewhere has an idea, and if they’re capable, tries to wrenchit out of the ether to make it a reality. Sometimes they’re lucky enough to ignite a single…

Read More
CyberDefenses - Shield

Strengthening Your Defenses: 5 Tips to Protect Your City from Cyber Threats

The wealth of citizen data municipalities manage daily combined with the critical services that depend on this data makes them attractive targets for cybercrime . If you’re following recent headlines then you’re aware of some cities that have been caught in the cross-hairs of ransomware attacks and the intent behind them range from simple annoyance…

Read More
CyberDefenses - Chess

"Lose Now, Win Later" Principle in Security

By Monty St John Every decision has a distinct set of consequences. Some outcomes can be predicted with particular certainty — others remain dark to any oracular vision. Over time, the effects of a change or shift to security play out. The measured outcomes often become the deciding factors as to whether the original scions…

Read More
CyberDefenses - Python

Credential Dump Collection Automation

by Monty St John In this previous article, it was mentioned at various points that collection should be automated.  After a few emails and slack conversation about it, sharing some approaches to automation seemed in order.  Mind you, CDI teaches a course on Python automation, which covers these topics in more detail.  Still, below covers…

Read More

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.