Veeam data Rezilion Spring4Shell Log4j vulnerabilities time Kaseya ransomware recovery REvil

Survey Surfaces Wasted Efforts Collecting Cybersecurity Data

Security teams are wasting time and resources normalizing data to store and analyze it in a separate platform instead of relying on the same data IT teams use to manage operations ...
Security Boulevard
Hacking With Your Nemesis

Hacking With Your Nemesis

In the first post in this series, On (Structured) Data, we talked about the gap area of offensive structured data and ended with the question, “If all of our offensive tools produced ...
👍

Acoustic: Solving a CyberDefenders PCAP SIP/RTP Challenge with R, Zeek, tshark (& friends)

Hot on the heels of the previous CyberDefenders Challenge Solution comes this noisy installment which solves their Acoustic challenge. You can find the source Rmd on GitHub, but I’m also testing the ...

Packet Maze: Solving a CyberDefenders PCAP Puzzle with R, Zeek, and tshark

It was a rainy weekend in southern Maine and I really didn’t feel like doing chores, so I was skimming through RSS feeds and noticed a link to a PacketMaze challenge in ...
NEW Data Analytics Courses

NEW Data Analytics Courses

Phoenix TS has added new Data Analytics courses to our public schedule. These five courses will help you increase your knowledge and skills to become a Big Data Expert! What is Data ...
Book Review: The Elements of Data Analytic Style by @jtleek i.e. Jeffrey Leek

Book Review: The Elements of Data Analytic Style by @jtleek i.e. Jeffrey Leek

In the introduction to the Data Science world, one needs to build the right frame surrounding the topic. This is usually done via a set of straight to the point books that ...