Cybersecurity Training and Certifications: Free to Paid

Cybersecurity Trainings and Certifications: from Free to Paid https://youtu.be/i23hAiKurY8?si=vfpgEXZurcYzjxJ8 Finding the right cybersecurity training and certification for your goals (and budget!) can be overwhelming. With options ranging from free resources […]
Detecting Malicious RDP Sessions in Volt Typhoon Cyber Attacks

The Volt Typhoon cyber attack is a sophisticated threat where adversaries exploit valid credentials to maintain stealthy access to IT and OT networks. One key tactic they employ is using…
When Firewalls Fail: Understanding and Mitigating Cyber Intrusions

When Firewalls Fail: Understanding and Mitigating Cyber Intrusions https://youtu.be/4nsOpJamaO0?feature=shared Introduction Firewalls are often seen as the frontline defense against cyber threats, but what happens when they become the target? In […]
Industrial Cybersecurity Terms Defined: OT-SCADA-RTU, Oh My!

Explore key industrial cybersecurity terms and better understand the acronym alphabet soup of OT, SCADA, PLC, HMI, RTU, and other terms.
Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure

This Tech Talk Tuesday episode by Dan Gunter from Insane Forensics examines the Volt Typhoon cyberattack.
Living Off the Land: How to Hunt for and Respond to LOLBins Attacks in OT

Learn how to detect and respond to LOLBins attacks in OT environments. This guide examines the 2022 Sandworm attack, explains LOLBins techniques, and provides actionable threat detection methods.
Aviation Cybersecurity Requirements

This article provides an overview of TSA cybersecurity directives, addressing compliance requirements, recommended practices, and the importance of continuous evaluation to strengthen organizational cybersecurity.
How To Use FTK Imager To Take Disk And Memory Images For Free

Learn how to use FTK Imager, a useful free cybersecurity tool, to create disk and memory images for free.
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy

Learn how to build an effective Incident Response (IR) policy using NIST 800-61. Discover key components, roles, severity levels, and compliance strategies to protect your organization from cyber threats.
How to Write an Incident Response Plan: IR Plan, Policy & Procedures (Part 1)

Learn how to create an effective incident response plan that goes beyond best practices and becomes a valuable tool in protecting against threats.