My key takeaways management wants to know what, not how IR plan aka policy IR playbook aka ...

Read More

My key takeaways HUMINT phrases to identify background characteristics an interesting OSINT aspect in conversation is special ...

Read More

My key takeaways hardening backup systems is key disconnected from the AD designed in a way, that ...

Read More

My key takeaways 3.BSI Grundschutztag was canceled ISMS = management in normal situations; BCM = management in ...

Read More

My key takeaways ELK can serve multiple purposes Log management SIEM File integrity monitoring Netflow Search solution ...

Read More

My key takeaways Red is a component of blue Blue can exist without red Red cannot exist ...

Read More

My key takeaways It’s all about reducing the attack surface OSINT Setup: use VPN’s and VM’s The ...

Read More

My key takeaways Analogie: north = ingress traffic south = outgress traffic east-west = lateral movement HTTP ...

Read More

My key takeaways Nicole says: Remember H.A.L.T (hungry, angry, lonely, tired) it really does make a huge ...

Read More

My key takeaways DMARC uses SPF and/or DKIM In 2021 the National Defense Authorization Act says the ...

Read More

My key takeaways Zeek does not capture whole packets but saves summaries of all conversations it sees ...

Read More

My key takeaways Bad documents eg with macros enabled in SharePoint? No need to bypass phishing controls ...

Read More