- Malware Analysis 3 Tools to Scan the File System With Custom Malware Signatures
Traditional antivirus tools don't allow custom signatures, but ClamAV, YARA, and Vscan let incident responders scan file systems for indicators of compromise without waiting for vendor updates. YARA...
- Assessments Security Assessment Report as a Critique, Not Criticism
Write security assessment reports as critique, not criticism. Focus on factual findings, processes, and organizational structure rather than chastising individuals—angry readers ignore key messages....
- Malware Antivirus Products Are Like Cold Medicine - Not A Rant
Antivirus products resemble cold medicine: established offerings have few differentiating characteristics, they treat symptoms rather than underlying problems, core technologies haven't changed...
- Risk Management The Reason For All Information Security Woes... Sleep Deprivation
Sleep deprivation fundamentally shifts a decision-maker's risk preference from minimizing losses to aggressively pursuing the best potential gains. Therefore, information security initiatives must be...
- Networking The Hidden Costs of Information Security Projects
Security projects often underestimate hidden costs: requirements gathering, transitioning from current solutions, project oversight, validation of completion, and personnel training. Applying Total...
- Incident Response Initial Security Incident Questionnaire for Responders
This cheat sheet helps incident handlers assess situations by asking the right questions: understanding background (how detected, security posture), defining communication parameters (coordinator,...