Other PowerShell Remoting: Transforming Enterprise Incident Response Introduction PowerShell Remoting revolutionizes remote …
Other Understanding Security Intelligence: A Modern Approach to Risk Management Security intelligence (SI) is a crucial discipline in c…
Other Security Intelligence Attacking the Cyber Kill Chain Coming in much later than I’d hoped, this is the …
Other Review Mandiant’s Incident Response Conference (MIRCon) Day 2 The first Mandiant Incident Response Conference (MIRCon…
Other Review Mandiant’s Incident Response Conference (MIRCon) Day 1 I have the good fortune this week of being able to atte…
Other Must Have Free Resources for Malware Analysis Cybercriminals are constantly innovating, developing ne…
Other Month of PowerShell Profile Hack for Easy Base64 Encoding and Decoding As PowerShell power user James Honeycutt points out, Po…
Other Month of PowerShell – Working with the Event Log, Part 3 – Accessing Message Elements In part 1, we looked at PowerShell get winevent to…
Other Month of PowerShell – Working with the Event Log, Part 2 Threat Hunting with PowerShell Event Logs In part 1, we looked at the PowerShell command to work …