Uncategorized

Using containers to analyze malware at scale coming to BSides Nova 2023

By |2023-08-15T07:29:29-04:00August 15th, 2023|Categories: Containers, Cyber, Defensive Methodology, Events, Training, Uncategorized|Tags: , , , , |

🕵‍Our President, Jose Fernandez will run our Using containers to analyze malware at scale (UCTAMAS) workshop at BSidesNoVA on Sep 8, 2023. This is the 4th run of this workshop which takes participant feedback to improve each iteration in technical content and delivery of workshop objectives.👨‍💻 If you are interested in containers, malware analysis and red [...]

Comments Off on Using containers to analyze malware at scale coming to BSides Nova 2023

ArsTechnica – Millions of dynamic DNS users suffer after Microsoft seizes No-IP domains

By |2022-06-15T01:05:39-04:00July 2nd, 2014|Categories: Uncategorized|

Microsoft seized over 22 No IP domains under the pretext that they hosted malicious activity. Is this the cost of being in the security business or have they overstepped legal barriers?

Comments Off on ArsTechnica – Millions of dynamic DNS users suffer after Microsoft seizes No-IP domains

ArsTechnica – We don’t need net neutrality; we need competition

By |2022-06-15T01:04:26-04:00June 27th, 2014|Categories: Uncategorized|Tags: , |

Although I may not agree with current policy regarding net neutrality, this op-ed from ArsTechnica conveys an interesting view point that almost persuades one to move away from net neutrality. Unfortunately, the end of net neutrality will mean added costs for sites, email and traffic in general. http://arstechnica.com/tech-policy/2014/06/we-dont-need-net-neutrality-we-need-competition/

Comments Off on ArsTechnica – We don’t need net neutrality; we need competition

DFIR Tournament SANSFIRE 2014

By |2022-06-15T08:45:11-04:00June 26th, 2014|Categories: Uncategorized|Tags: , , |

SANS is hosting a forensics challenge this evening that reinforces the need for improved forensic reflexes. For example, if you normally do the same actions when confronted with a task, this becomes a form of rapid memory reflexes (RMR). If you have to research information in a book or online, you normally apply external memory reflexes [...]

Comments Off on DFIR Tournament SANSFIRE 2014

Verizon 2014 data breach report

By |2022-06-15T01:00:34-04:00June 26th, 2014|Categories: Uncategorized|Tags: , , |

If you are not familiar with this annual report, please take the time and review the findings from Verizon’s in-depth analysis on data breaches. http://www.verizonenterprise.com/DBIR/2014/reports/rp_Verizon-DBIR-2014_en_xg.pdf

Comments Off on Verizon 2014 data breach report

CSD is providing PCI DSS 3.0 vulnerability scanning for clients

By |2022-06-15T01:13:25-04:00January 4th, 2014|Categories: Uncategorized|

PCI DSS 3.0 Changes Recent revisions in PCI DSS 3.0 require that merchants conduct a vulnerability assessment or penetration test against a companies IT resources for the purpose of providing quality assurance for customers. Read more here: https://www.pcisecuritystandards.org/documents/DSS_and_PA-DSS_Change_Highlights.pdf

Comments Off on CSD is providing PCI DSS 3.0 vulnerability scanning for clients
Go to Top