Articles on Incident Response
- Malware Free Online Tools for Examining Suspicious PDFs Free online tools automate suspicious PDF analysis without local installation: QuickSand for manual structure exploration, Jsunpack and Wepawet for JavaScript deobfuscation, and Gallus for exploit...
- Incident Response Making Sense of Digital Forensics and Incident Response Disciplines Digital forensics encompasses examining artifacts in databases, memory, network traffic, and mobile devices beyond traditional hard drive analysis. Incident response complements forensics with...
- Malware Why I Make Fun of Advanced Persistent Threat (APT)
- Malware Market Segmentation in Computer Attacks Computer attackers segment victims by organization size (focused enterprise targets vs. mass-scale SMBs), geography (paying more for North American infections), and industry. Defenders need to...
- Incident Response How Much Should an Information Security Book Cost?
- Risk Management Could Regulatory Compliance Encourage Weaker Security? Compliance replaces social norms with market exchanges—companies see fines as a "price" rather than feeling obligated to protect data. Like day care parents who arrived late more often after fines...