My Writing
- Malware Emerging Information Security Threats, 2007
- Malware The Storm Worm, October 2007
- Malware Analysis Using VMware for Malware Analysis
- Malware Analysis Cheat Sheet for Analyzing Malicious Software Malware analysis combines behavioral examination with static and dynamic code analysis to understand malicious software. Key steps include using automated sandboxes for triage, monitoring system and...
- Leadership Situational Awareness for Cybersecurity Professionals Security programs often fail not because of technical shortcomings but because they ignore organizational dynamics. MIT Sloan's Three Lenses framework helps security professionals understand their...
- Networking Inside Network Perimeter Security, the Book