Blogs
May 7, 2021 / April 21, 2023 by Query
The term threat hunting spawns different ideas and has different meanings for seemingly everyone you talk to. Understanding what threat hunting is will help you better equip your security teams to respond to alerts and mitigate risk. But is it basic triage of known indicators of compromise (IOC) in a proactive manner or some magical […]
Read more »
April 22, 2021 / April 21, 2023 by Query
Threat investigations are one of the most important tasks security analysts face today. To quantify the importance and complexity here are a couple of statistics from a recent IBM “Cost of a Data Breach Report 2020.” According to the report, the average time to detect and contain a data breach caused by a malicious actor […]
April 15, 2021 / April 21, 2023 by Query
Creating an incident response program and team is the core of any strong cybersecurity program. According to one 2020 report, 7 million data records are compromised every day. With a better understanding of incident response, you can mature your security posture to reduce data breach risks What is incident response (IR)? At a very high […]
March 31, 2021 / March 22, 2023 by Query
An introduction of the supply chain attack caused in the Orion update protocol of the Solarwinds network management software suite of 2020. Microsoft identifies 40+ victims of SolarWinds hack (Source: Microsoft) Though it gained notoriety in December of 2020, the attack was perpetrated in March. The breach of around 18,000 sites all across North America […]
Newsroom
December 18, 2020 / December 24, 2022 by Query
December 16, 2020 / December 24, 2022 by Query
Introduction You might have read several of our other network security blogs covering topics that people in the cybersecurity field need to know. Now is an excellent time to talk about Distributed Denial of Service (DDoS). If you were to inspect the security landscape, you would find several instances where a cyberattack was not trying […]
November 18, 2020 / February 16, 2023 by Query
Introduction DNS is a widely used phonebook system on the Internet. It is used simply to query the IP address associated with a humanly readable and memorizable name. But it is a lot more than that as this article explains. If you have not yet read our previous article do so here: DNS and its […]
November 11, 2020 / March 22, 2023 by Query
*Don’t have R installed yet? Read my previous article to learn how: Statistical Computing: Installing R and RStudio Introduction to R Language Click on File > New File > R Script What to expect? This blog will just give you pointers to R and kick start to “R”. Detailed R project documentation can be found […]
October 28, 2020 / March 22, 2023 by Query
“Statistical computing is the interface between statistics and computer science.” What is Statistical Computing? Computational statistics are statistics done with a computer. Everything from ML to the graphical model to the inverse eigenvalue problem is involved in statistical computing. Data analysis and statistical modeling techniques can be challenging, and computer software is the best way […]
October 21, 2020 / March 22, 2023 by Query
It’s the URL, stupid (me)! Consider a scenario. You are in a miserable situation where you accidentally clicked on some phishing link or scam URL. A long time ago, when the web was safe, and viruses, trojans, and worms were transmitted only by EXE or BIN files, we could rest assured that the virus scanner […]