Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure December 5, 2023 Watch »
IR Plan, Policy & Procedures Part 2: How To Write a Cybersecurity Incident Response Policy February 14, 2023 Watch »
How to Write an Incident Response Plan: IR Plan, Policy & Procedures (Part 1) January 11, 2023 Watch »
How To Use Process Hacker to Find Intrusions During Incident Response and Threat Hunting Engagements November 2, 2022 Watch »
Threat Hunting with Pyshark: Using Open Source Python Libraries to Automate Threat Hunting June 28, 2022 Watch »
Threat Hunting Is A Team Sport: How To Build and Lead Effective Threat Hunting Teams June 21, 2022 Watch »
Threat Hunting Beyond Your Boundary With Open Source Tools: Automating With Python and Shodan June 14, 2022 Watch »
Why We Switched from Reactive to Proactive Threat Hunting (And Why It Led to Finding More Threats) June 7, 2022 Watch »
How To Improve Threat Hunting Success With The “Right” Intel Using 3 Basic Questions May 31, 2022 Watch »
Beyond Blacklists: Why Behavioral Threat Hunting is Your Security Secret Weapon (And Why Indicators Still Matter) May 24, 2022 Watch »