โŒ

Reading view

PODCAST: Beacon Analysis

Join special guest Chris Brenton, COO of Active Countermeasures, as he discusses the anatomy of beacons and why you need to be looking for them during a threat hunt. He [โ€ฆ]

The post PODCAST: Beacon Analysis appeared first on Black Hills Information Security, Inc..

๐Ÿ’พ

  •  

PODCAST: From Active Countermeasures โ€“ Attack Tactics 4

Join John Strand as he continues his Attack Tactic series this time with the defense ideas for the attacks mentioned in episode 3 (see more here) To see the entire [โ€ฆ]

The post PODCAST: From Active Countermeasures โ€“ Attack Tactics 4 appeared first on Black Hills Information Security, Inc..

๐Ÿ’พ

  •  

WEBCAST: Tales from the Network Threat Hunting Trenches

John Strand// In this webcast, John walks through a couple of cool things weโ€™ve found useful in some recent network hunt teams. He also shares some of our techniques and [โ€ฆ]

The post WEBCAST: Tales from the Network Threat Hunting Trenches appeared first on Black Hills Information Security, Inc..

  •  
โŒ