top of page

WELCOME TO CRONINITY

Woman with Headphones
Clicking on a Tablet
Sleep App
Girl with Tablet
In the Woods
Augmented Reality Glasses
Home: Welcome

Insider Threat

Three categories of Insider Threats: Malicious insiders Theft of IP Sabotage Espionage Negligent Insiders Ignoring policy and procedures...

First 90 Days

A highly recommended book for navigating a new leadership role is The First 90 Days.

Password Cracking - Hashcat

Three password cracking techniques that can be used with the password cracking tool hashcat. The three techniques are: Dictionary based...

Mimikatz

The Mimikatz story is fascinating to me. “Mimikatz first became a key hacker asset thanks to its ability to exploit an obscure Windows...

EDR Evaluation - Powershell Activity

Users of Endpoint Detection Response (EDR) systems know they are powerful tools for detecting Threat Actors (TA)'s. But there is often be a lot of mystery about how they work and hence the badness of what they detect and/or block. This mystery makes can not only make it difficult to understand EDR coverage of attacks, but more critically understand an major EDR pain point which is they tend to have a lot of false positives. For understanding how EDRs work, I really like th

Home: Blog2

CONTACT

500 Terry Francois Street San Francisco, CA 94158

123-456-7890

  • Facebook
  • Twitter
  • LinkedIn
Home: Contact
  • Facebook
  • Twitter
  • LinkedIn

©2021 by croninity. Proudly created with Wix.com

bottom of page