My key takeaways management wants to know what, not how IR plan aka policy IR playbook aka ...
Connecting the Dots
SECURITY, EMAIL, TECH
SECURITY, EMAIL, TECH
My key takeaways management wants to know what, not how IR plan aka policy IR playbook aka ...
My key takeaways HUMINT phrases to identify background characteristics an interesting OSINT aspect in conversation is special ...
My key takeaways hardening backup systems is key disconnected from the AD designed in a way, that ...
My key takeaways 3.BSI Grundschutztag was canceled ISMS = management in normal situations; BCM = management in ...
My key takeaways ELK can serve multiple purposes Log management SIEM File integrity monitoring Netflow Search solution ...
My key takeaways Red is a component of blue Blue can exist without red Red cannot exist ...
My key takeaways It’s all about reducing the attack surface OSINT Setup: use VPN’s and VM’s The ...
My key takeaways Analogie: north = ingress traffic south = outgress traffic east-west = lateral movement HTTP ...
My key takeaways Nicole says: Remember H.A.L.T (hungry, angry, lonely, tired) it really does make a huge ...
My key takeaways DMARC uses SPF and/or DKIM In 2021 the National Defense Authorization Act says the ...
My key takeaways Zeek does not capture whole packets but saves summaries of all conversations it sees ...
My key takeaways Bad documents eg with macros enabled in SharePoint? No need to bypass phishing controls ...
Page [tcb_pagination_current_page] of [tcb_pagination_total_pages]