Category: Incident Response

Window Forensics

Windows Forensics: Evidence of Execution

Ever wonder how forensic analysts and information security and incident response practitioners can recreate timelines demonstrating who ran which applications…

Read post
Nuclear Dystopia

Internet Access and Nuclear Dystopia

The similarities between a nuclear dystopia and accessing the internet are surprising. Businesses should consider treating the internet as if…

Read post
scary forrest

5 Scary Things Your CISO Could Hear from Their Team

Sometimes, running an information security program can feel a lot like being in the middle of a horror film. Turn…

Read post
10 Characteristics of Companies that Avoid Cyber Security Incidents

10 Traits of Companies that Avoid Cyber Incidents

You can’t prevent all security incidents from happening, but businesses that avoid many of them tend to have commonalities. Here…

Read post
group of people hunkered down working on computers together

10 Reasons to Use an Incident Response Consultant

It’s impossible to stop every breach from happening. There is no “if” to being breached, only “when”. It’s important for…

Read post