Cybersecurity Training and Certifications: Free to Paid

Cybersecurity Trainings and Certifications: from Free to Paid https://youtu.be/i23hAiKurY8?si=vfpgEXZurcYzjxJ8 Finding the right cybersecurity training and certification for your goals (and budget!) can be overwhelming. With options ranging from free resources to premium certifications, this guide will help you navigate your choices, with a special focus on ICS/OT security education. Considerations When Choosing Cybersecurity Training Before […]
Industrial Cybersecurity Terms Defined: OT-SCADA-RTU, Oh My!

Explore key industrial cybersecurity terms and better understand the acronym alphabet soup of OT, SCADA, PLC, HMI, RTU, and other terms.
Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure

This Tech Talk Tuesday episode by Dan Gunter from Insane Forensics examines the Volt Typhoon cyberattack.
Living Off the Land: How to Hunt for and Respond to LOLBins Attacks in OT

Learn how to detect and respond to LOLBins attacks in OT environments. This guide examines the 2022 Sandworm attack, explains LOLBins techniques, and provides actionable threat detection methods.
How To Use FTK Imager To Take Disk And Memory Images For Free

Learn how to use FTK Imager, a useful free cybersecurity tool, to create disk and memory images for free.
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy

Learn how to build an effective Incident Response (IR) policy using NIST 800-61. Discover key components, roles, severity levels, and compliance strategies to protect your organization from cyber threats.
How to Write an Incident Response Plan: IR Plan, Policy & Procedures (Part 1)

Learn how to create an effective incident response plan that goes beyond best practices and becomes a valuable tool in protecting against threats.
Writing Suricata Rules: Understanding the Basic Rule Format

An in-depth understanding of basic Suricata rules can bolster Suricata’s ability to detect and defend.
Introduction to Zeek: Open-Source Threat Hunting and Network Traffic Analysis

The article introduces Zeek, an open-source network traffic analyzer for security monitoring, threat hunting, and incident response, highlighting its ability to process PCAP files or live network data.
Using MITRE ATT&CK for Enterprise and ATT&CK for ICS in Industrial Environments

MITRE’s ATT&CK for Enterprise matrix and ATT&CK for ICS matrix provide two valuable reference models for network security. In this edition of #TechTalkTuesday, we will be joined by Ron Fabela from SynSaber to explore why you should be using both models to secure industrial systems and networks.