Skip to main content

April 03, 2018

Escape and Evasion Egressing Restricted Networks – Part 2

Attackers and security assessors alike are utilizing a technique called domain fronting, which masks malicious command and control (C2) traffic. This ...

See Details

April 12, 2017

Maturing IR Capabilities into an Incident Management Program – Part 2 of 3

The capability to respond effectively to cyber incidents is one of the most critical components of an enterprise security program. However, many compa...

See Details