blue team - Tagged - Security Boulevard

How purple team operations helped defend the Pentagon — and can help your security team today.

The purple team construct is changing cybersecurity for the better. Here is how you build, lead, and manage effective purple team operations. The post How purple team operations helped defend the Pentagon ...

Being a Defender

 1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends, and tools are and implement that knowledge into Operations.2. Never allow a ...
Blue Team Puzzle

Blue Team Puzzle

Several years ago, I created a "malware puzzle" - basically, a crossword puzzle but with terms related to malware. You can find that puzzle here: https://bartblaze.blogspot.com/2013/08/malware-puzzle.htmlSeeing crosswords are a hobby of mine, I ...
EH-Net - Steph Ihezukwu - BBP: You’ve Just Been Promoted...

BBP: You’ve Just Been Promoted…

“So, I heard back from the team. They really liked you, but I had no idea that you’ve just been promoted. The policy is that if you’ve been promoted, you have to ...

Red Teaming: How to Run Effective Cyber-Drills?

What is red teaming? How is it different from conventional penetration testing? Why do we need blue, red, and white teams? How are cyber-drills carried out, and what results should be expected? ...

Red Teaming for Blue Teamers: A Practical Approach Using Open Source Tools

| | blue team, events, Red Team, rsa
For the majority of people in the information security world, the act of offensive hacking is something they are tasked with protecting against but have little ability to do themselves. That is ...
EH-Net - Steph Ihezukwu - BBP: My Path to the CISO Chair

BBP: My Path to the CISO Chair

Testing, testing. May I have your attention, please. *Ahem* Allow me to introduce myself and this new series of articles for The Ethical Hacker Network. My name is Stephanie, better known as ...

DEF CON 27, Blue Team Village, Carlos Garay’s ‘Memhunter Automated Hunting Of Memory Resident Malware’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink ...

DEF CON 27, Blue Team Village, Georgios Kapoglis’ ‘Serverless Log Analysis On AWS’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink ...

DEF CON 27, Blue Team Village, Dumby’s (@uncl3dumby) ‘Anatomy Of A Megabreach: Equifax Report’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn. Permalink ...