Blogs
January 19, 2023 / May 25, 2023 by Eric Parker
Browser tabs from hell. If you’re a security analyst, you know the pain. Working multiple investigations, tickets, creating reports, reading the latest security news, and just browsing, you often find yourself with dozens of tabs across single or multiple browsers. Does your team have browsers that look like this? As a “recovering” security analyst, I […]
Read more »
April 15, 2021 / April 21, 2023 by Eric Parker
Creating an incident response program and team is the core of any strong cybersecurity program. According to one 2020 report, 7 million data records are compromised every day. With a better understanding of incident response, you can mature your security posture to reduce data breach risks What is incident response (IR)? At a very high […]
November 18, 2020 / February 16, 2023 by Eric Parker
Introduction DNS is a widely used phonebook system on the Internet. It is used simply to query the IP address associated with a humanly readable and memorizable name. But it is a lot more than that as this article explains. If you have not yet read our previous article do so here: DNS and its […]
October 21, 2020 / March 22, 2023 by Eric Parker
It’s the URL, stupid (me)! Consider a scenario. You are in a miserable situation where you accidentally clicked on some phishing link or scam URL. A long time ago, when the web was safe, and viruses, trojans, and worms were transmitted only by EXE or BIN files, we could rest assured that the virus scanner […]