-
Reflections on the US Government’s OIG Report on CISA’s Automated Indicator Sharing Program
A blog summarizing the US Government’s OIG report on CISA’s Automated Indicator Sharing program Read More
-
Top SANS Summit Talks of 2024
This year, SANS hosted 13 Summits from OSINT, ICS, Ransomware, DFIR to HackFest. Here were the top-rated talks of the year. Read More
-
Defensible Security Architecture and Engineering: Designing and Building Defenses for the Future (Japanese)
私がいつも言っている通り、「攻撃者は怠け者」です。要は、彼らは常に最も抵抗の少ない道を進むのです。防御側が彼らの戦術、技術、手順を習得するにつれ、攻撃能力と防御能力の非対称的なギャップは縮小し、攻撃者は戦場、戦略の変更を余儀なくされ、何度も繰り返されるゲームは延々と続くことになります。 Read More
-
Is Your Organisation Ready for the DORA Deadline?
A blog about the EU’s new financial sector cybersecurity regulations, DORA and TIBER-EU Read More
-
SANS Threat Analysis Rundown in Review: Breaking Down December 2024’s Discussion
Exploring the power of the PEAK Threat Hunting framework Read More
-
SEC587: Advanced Open-Source Intelligence Course Update – What’s New?
A blog about the ipdate to the SANS SEC587 OSINT course. Read More
-
A Prescription for Windows Prefetch Analysis
A blog about the latest update to Siftgrab, including a new function that generates several preformatted Excel workbooks. Read More
-
ICS Cybersecurity Awareness: Strengthening Critical Infrastructure Through Practical Skill Deployment
A blog about the importance of ICS/OT cybersecurity awareness training. Read More
-
MUDding Around: Hacking for gold in text-based games
MUDding Around: Hacking for gold in text-based games