Other PowerShell Remoting: Transforming Enterprise Incident Response Introduction PowerShell Remoting revolutionizes remote …
Other Understanding Security Intelligence: A Modern Approach to Risk Management Security intelligence (SI) is a crucial discipline in c…
Other Security Intelligence Attacking the Cyber Kill Chain Coming in much later than I’d hoped, this is the …
Other Review Mandiant’s Incident Response Conference (MIRCon) Day 2 The first Mandiant Incident Response Conference (MIRCon…
Other Review Mandiant’s Incident Response Conference (MIRCon) Day 1 I have the good fortune this week of being able to atte…
Other Must Have Free Resources for Malware Analysis Cybercriminals are constantly innovating, developing ne…
Other Month of PowerShell Profile Hack for Easy Base64 Encoding and Decoding As PowerShell power user James Honeycutt points out, Po…
Other Month of PowerShell – Working with the Event Log, Part 3 – Accessing Message Elements In part 1, we looked at PowerShell get winevent to…
Forensic tool assessment USB Historian 2024 Forensic Analysis Toolkit: In-Depth Evaluation I. Core Architecture & Technical Innovations Advanc…