Articles on Training
- Malware Analysis Mastering 4 Stages of Malware Analysis Malware analysis techniques form a pyramid of increasing complexity: fully-automated analysis, static properties examination, interactive behavioral analysis, and manual code reversing. Analysts...
- Malware Analysis Teaching Malware Analysis and the Expanding Corpus of Knowledge Malware analysis skills have expanded in complexity as software—benign and malicious—has grown more sophisticated. From a 2.5-hour session in 2001 to a full six-day course with capture-the-flag...
- Malware Analysis Several Posts on Malware Analysis Tools
- Training Free Recorded Malware Forensics and Analysis Webcasts
- Authentication Creative Options for Better Authentication of Mobile Phone Users Mobile phone authentication can move beyond awkward passwords and PINs by leveraging built-in sensors for fingerprints, walking patterns, facial geometry, voice, thermal imaging, and grip...
- Training Tying Shoelaces and Information Security Most people tie shoelaces with the weaker knot because the stronger version is harder for children to learn. Similarly, security "best practices" we've followed for years may not be optimal—tribal...