Articles on Training
- Tools When Successful Security Measures Are Taken For Granted When security controls consistently protect without incident, beneficiaries may question their value: "No breaches recently—why do we need a CISO?" Collect meaningful metrics showing safeguards are...
- Malware Using Netsh for Easier Network Setup in a Malware Lab Windows' netsh tool can save and restore network configurations, useful for malware analysis labs that frequently switch between isolated segments and Internet-connected networks. Save configurations...
- Malware The Dark Side of Remote Desktop The Morto worm spread by scanning for RDP on port 3389 and brute-forcing Administrator passwords using common credentials. Tools like TSGrinder and Ncrack automate RDP password attacks. Mitigations...
- Incident Response How to Get into Digital Forensics or Security Incident Response Employers rarely invest in growing beginner forensics analysts, so individuals must build relevant skills within current roles. System admins can learn incident investigation tools, network admins...
- Training Psychological Similarities Between Shoplifting and Malicious Hacking Studies suggest 60% of consumers have shoplifted at some point—most are amateurs who steal sporadically. Shoplifters report excitement from adrenaline, superiority over store clerks, and belonging to...
- Career New Job, New Challenges, New Opportunities