IOC
One Step Beyond: Using Threat Hunting to Anticipate the Unknown
Article by Paul German, CEO, Certes NetworksA cyber threat could be lurking in any corner of an organisation’s infrastructure. The complex networks encompassing numerous smart and interconnected technologies make it easy for ...
Behavioral analysis versus artifacts/IOC’s
Much of our defensive architecture today is based on the ability to extract indicators of compromise from logs, packet data and flow data and the monitoring of processes on the system. While ...
Oh, BTW, The Russians Cyberattacked the U.S. Critical Infrastructure
While we have been distracted by the dalliances of an errant president, the exfiltration from Facebook of personal information belonging to a gazillion users, and the use of those data to influence ...

