C I N S T W X
  • Jean-Christoph von Oertzen
  • Blog
  • Infosec glossary
  • Home
  • |
  • Tag: blue team

Email, Security

Webinar takeaway – How to Detect and Respond to Business Email (M365) Compromise

My key takeaways BEC external-to-internal passes all technical security measures like SPF, DKIM and ...

Read More

Security

Webinar takeaway: Atomic Red Team Hands-on Getting Started Guide

My key takeaways The Atomic Red Team Project (ART) is a open source library ...

Read More

Security

Webinar Takeaway: EMERGENCY WEBCAST: OK, let´s talk about ransomware…

My key takeaways 3 types of ransomware encrypt hard drive steal files and data ...

Read More

Security

Webinar takeaway: Hacking Packet Captures: The Foundations of Network Security

My key takeaways Zeek does not capture whole packets but saves summaries of all ...

Read More

Security

Webinar takeaway: How to Analyze Encrypted Traffic on Your Network

My key takeaways Encrypted traffic on the wire: can see headers, can’t see payload ...

Read More

Security

Webinar takeaway: Learn to Detect and Defend Against Supply Chain Attacks Before They Compromise Your Network

My key takeaways First trojan probably was implemented 1983 by Ken Thompson, who invented ...

Read More
Load More

Copyright 2025 Jean-Christoph von Oertzen - Privacy policy - Imprint