Webcast – BPF – Picking Packets
GoToWebinarWhat do you do when you're caught between a loaded high-speed network cable and a packet analysis tool that just can't keep up? […]
What do you do when you're caught between a loaded high-speed network cable and a packet analysis tool that just can't keep up? […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course! So far...We have had almost 20,000 students […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course! So far…We have had over 20,000 students […]
Our "Malware of the Day" blog series has become a huge hit over the last year and a half! The goal of the […]
R.I.T.A. (Real Intelligence Threat Analytics) is an open-source framework for detecting command and control communication through network traffic analysis. But how exactly does […]
So you've studied threat hunting methodology and researched all the threat hunting tools... but how do you actually apply all this knowledge into […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course! So far...We have had almost 20,000 students […]
Threat hunting in a cloud environment is tricky. The span port we depend on to get a copy of all network traffic doesn’t […]
Every threat hunter needs a set of tools they can count on when completing a hunt. In this webcast, Chris Brenton will go […]
Chris Brenton from Active Countermeasures is conducting another free, one-day, Cyber Threat Hunting Training online course! So far...We have had over 20,000 students […]
“Security” is arguably one of the most challenging disciplines to move from being an individual contributor (IC) to being a manager. While security […]
Cyber Deception is a strategy used to attract cyber criminals away from an enterprise’s true assets and divert them to a monitored decoy. […]