NETWORK
Endpoint and Network Hunting: A Q&A with Ryan Nolette
This post was originally published here by Sqrrl Team. Ryan Nolette is a security technologist at Sqrrl. Throughout his career he has attained experience in IT/Security planning at a large scale and is proficient in multiple platforms and security techniques. He has experience with troubleshooting, auditing and installations, network intrusion detection, security, incident response, threat intelligence, […]
Network Segmentation could protect your small business network from Cyber Attacks
Security has become an important issue to focus on small businesses that rely on websites, smartphones, and connected devices. Thus, a network security company called Tufin has released an info graphic titled “ Making Security Manageable Through Network Segmentation” which introduces us to a new concept called network segmentation. The report suggests that “Network Segmentation” […]
The Hunter’s Den: Lateral Movement Part 1- Understanding Lateral Movement
This post was originally published here by Sqrrl Team. The Hunter’s Den blog series aims to go beyond framework and theory and dig into practical tips and techniques for threat hunting. In our previous post, we examined the practical ways to hunt for C2 activity. In this series of posts, we will take a look […]
BUILD YOUR (ISC)² NETWORK THROUGH CHAPTERS IN EMEA AND NORTH AMERICA
This post was originally published here by (ISC)² Management. Are you looking to start an (ISC)² Chapter in your area? The enrollment period for chapters in the Europe, Middle East and Africa (EMEA) and North America regions is now open through February 5. Through the chapter program, (ISC)² members and other information security professionals further […]