On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 11: Functional CompositionIntroductionWelcome back to part 11 of the On Detection blog series. This next article serves as a conceptual foundation upon which we will build over the next few posts ...
Domain of Thrones: Part II

Domain of Thrones: Part II

Written by Nico Shyne & Josh PragerIntroduction Part IIIn the first installment of “Domain of Thrones,” we meticulously explored an array of six distinctive domain persistence techniques:Credential Theft on the Domain Controller (DC)NTDS AccessDCSyncGolden ...
Domain of Thrones: Part I

Domain of Thrones: Part I

Written by Nico Shyne & Josh PragerThe Game of Domain DominanceJust as in the political landscape of Westeros, defenders face a dynamic adversarial relationship…except instead of fighting rival families, defenders are locked into ...
On Detection: Tactical to Functional

On Detection: Tactical to Functional

Part 9: Perception vs. ConceptionThe concepts discussed in this post are related to those discussed in the 9th session of the DCP Live podcast. If you find this information interesting, I highly ...
wargames cybersecurity ransomware strategy breach prevention strategy cybersecurity

Leveraging Wargaming Principles for Cyberdefense Exercises

Wargames are an excellent way to ensure your cyberdefense plans are solid and your processes are current ...
Security Boulevard
The Defender’s Guide to the Windows Registry

The Defender’s Guide to the Windows Registry

It’s dangerous to defend the registry alone! Take this!Authors: Luke Paine & Jonathan JohnsonIntroductionWelcome to the Defender’s Guide. This is a series of blog posts designed to give you a ground-up start to defending ...

How purple team operations helped defend the Pentagon — and can help your security team today.

The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations. The post How purple team operations helped defend the Pentagon ...

Being a Defender

 1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends, and tools are and implement that knowledge into Operations.2. Never allow a ...
Blue Team Puzzle

Blue Team Puzzle

Several years ago, I created a "malware puzzle" - basically, a crossword puzzle but with terms related to malware. You can find that puzzle here: https://bartblaze.blogspot.com/2013/08/malware-puzzle.htmlSeeing crosswords are a hobby of mine, I ...