Building and Managing Security Operations Centers (SOCs)
There is a cliché business term that references the success of an information technology goal, business, function, etc comes down to...
There is a cliché business term that references the success of an information technology goal, business, function, etc comes down to...
Names phases of the "Intelligence Cycle"? Identify the level of indicators in the Pyramid of Pain? Identify the aspects of the Diamond...
Here are some key points to consider about CTI reports: The availability of CTI reports is on the rise, and their quality is improving....
Zeek (formerly known as Bro) is an open-source project conceived by Vern Paxson. Its roots trace back to its original incarnation as...
I recently finished the Champlain College Masters of Digital Forensics program. I have a background in telecommunications and networking...
The Cuckoo's Egg - Cliff Stoll The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Paperback, 2005 (Audio available)...
Measuring and Managing Information Risk: A FAIR Approach - Jack Freund and Jack Jones Measuring and Managing Information Risk: A FAIR...
Intelligence-Driven Incident Response: Scott J. Roberts and Rebekah Brown Intelligence-Driven Incident Response: Outwitting the...
The Goal: A Business Graphic Novel - Eliyahu M. Goldratt , Dwight Jon Zimmerman The Goal: A Business Graphic Novel - 1984 (Audio...
Adversarial Tradecraft in Cybersecurity - Dan Borges Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time...
In the realm of cybersecurity monitoring and response, an organization's effectiveness hinges on its proficiency across all facets of the...