top of page

WELCOME TO CRONINITY

Woman with Headphones
Clicking on a Tablet
Sleep App
Girl with Tablet
In the Woods
Augmented Reality Glasses
Home: Welcome

Virtualization CPUs

A virtual machine (VM) CPU is not a physical, silicon-based CPU but rather a logical construct managed by the hypervisor. It represents a...

Incident Response - Linux

Linux Incident Response Approach Overview When conducting incident response on Linux systems, certain types of analysis can be performed...

The story of the 'HeartBleed' SSL Vulnerability

The term "heartbleed" is a play off of the word "heartbeat" which was the OpenSSL function exploited for the attack. The VOX article,...

EDR Evaluation - EDR System Operations (SysOps)

EDR/XDR platforms often lack transparency in their detection logic. This is intentional, designed both to prevent threat actors from...

Insider Threat

Three categories of Insider Threats: Malicious insiders Theft of IP Sabotage Espionage Negligent Insiders Ignoring policy and procedures...

First 90 Days

A highly recommended book for navigating a new leadership role is The First 90 Days. It provides valuable insights for leaders stepping...

Home: Blog2

CONTACT

500 Terry Francois Street San Francisco, CA 94158

123-456-7890

  • Facebook
  • Twitter
  • LinkedIn
Home: Contact
bottom of page