Incident Response - File Analysis
During incident response investigations, a critical task is analyzing files for suspicious behavior. There are multiple levels of...
![]() | ![]() | ![]() |
---|---|---|
![]() | ![]() | ![]() |
During incident response investigations, a critical task is analyzing files for suspicious behavior. There are multiple levels of...
Your habits are building blocks of your character. Strong habits lead to strong character, and strong character creates exceptional leaders.
Embrace each day with courage, as if it were your last, free from fear. Release the grip of death’s shadow by accepting it as life's journey
When faced with a challenging situation, pause and ask yourself 3 key questions.
Highlighting and tracking improvement ideas and tasks derived from the incident using the 5 Why’s model to identify root causes and solution
"We must never forget that we may also find meaning in life even when confronted with a hopeless situation" --Viktor Frankyl
“Between stimulus and response there is a space. In that space is our power to choose our response." --Viktor Frankel
A young woman stood before a captivated audience, a glass of water raised in her hand. With a confident smile, she began her lesson on...
Confidence is more than just a feeling; it’s a skill—a message to the world that says, “You can trust me because I trust myself.”
The Foundation of Leadership: Understanding Yourself Before exploring the depths of character, you must first confront the most crucial...
A leadership mantra I came across years ago encapsulates great leadership in three simple letters: CCC — Character, Competence, Courage
Good character is the cornerstone of exceptional leadership.
Language is a powerful tool, but it can also be wielded as a weapon to confuse, manipulate, and control.
A virtual machine (VM) CPU is not a physical, CPU but rather a logical CPU managed by the hypervisor. It represents a part of the real CPU.
Virtualization platforms have become standard in many organizations and have been more commonly been exploited by threat actors.
Linux Incident Response Approach Overview When conducting incident response on Linux systems, certain types of analysis can be performed...
The term "heartbleed" is a play off of the word "heartbeat" which was the OpenSSL function exploited for the attack. The VOX article,...
If an elastic query in the dashboard does not return any records, the dashboard may not display zero values for the visualized data.
EDR/XDR platforms often lack transparency in their detection logic.
Three categories of Insider Threats: Malicious insiders Theft of IP Sabotage Espionage Negligent Insiders Ignoring policy and procedures...