Posted in Security

Kill Chains and Post Compromise Assessment Frameworks

When it comes to methodologies for preventing and detecting compromise, there are some great options available that have been tried and tested. While no network security tactic or technique is fool proof and completely comprehensive, there are two overarching frameworks that have changed the landscape with regard to pre and post compromise assessment.

Continue Reading... Kill Chains and Post Compromise Assessment Frameworks
Posted in Politics Security

Navy collisions: Could hackers have played a part | USA Today

USA Today article It is interesting to me that people doubt hackers could have played a part in these accidents. It’s not that it’s probable,…

Continue Reading... Navy collisions: Could hackers have played a part | USA Today
Posted in Internet Safety News Security Social

An Instagram hack hit millions | The Verge

The Verge – Instagram Hack Article It looks like another social media platform has been hacked yet again. This time millions of phone numbers and…

Continue Reading... An Instagram hack hit millions | The Verge