CSNPJul 18, 20224 minSummiting the Pyramid of PainAuthor Christopher Peacock The TTP Pyramid This blog was originally published on 3/16/22 by Scythe. A Special Thanks The TTP Pyramid...
CSNPMay 30, 20222 minCTI Networking ReportOriginally published on January 28, 2022 on Blog.Pulsedive.com Author: Grace Chi "Is Sharing Caring? A report on current cyber threat...
CSNPApr 18, 20226 minWhat is Zero Trust?Author: Siggi Bjarnason Overview Let us go over what zero trust is. This is the latest buzzword in the infosec/cybersecurity industry...
CSNPAug 9, 20216 minLet’s Talk About Windows Drivers Author John Neff Another day, another Windows driver vulnerability. Cyber Security professionals found their Windows networks...
Emily StammFeb 22, 20213 minGetting Started with Table Top Exercises for Incident ResponseAuthor Elaine Harrison-Neukirch In the past year, many organizations have moved to a remote workforce. Team sizes and resources are...
Emily StammFeb 15, 20213 minUsing OSINT Reconnaissance to Protect Your OrganizationAuthor Britton White Open Source Intelligence (OSINT) reconnaissance involves using publicly available resources to passively gather...
Emily StammFeb 4, 20215 minDigital Document Signing Laws: an OverviewThis article originally appeared on SSL.com with the title Digital Document Signing Laws: A Global View Author: Connor Wilson If the...
Emily StammFeb 1, 20213 minWhy You Should Embrace Purple Team TodayIntroducing Purple Teaming Author Jorge Orchilles Wait, wait, wait, are you introducing us to another color in information security? Yes...
Emily StammJan 7, 20212 min“Raccoon Attack” Targets TLS 1.2 and Earlier, but Is Difficult to ExploitThis blog originally appeared on SSL.com with the title "Racoon Attack" Targets TLS 1.2 and Earlier, but is Difficult to Exploit Author:...
josemiguelmaldonadNov 16, 20202 minZero Trust: A Simple ExplanationOver the last few years, Zero Trust has become something of a buzzword in in the cybersecurity field. Here is a quick primer on what this t