by hatelaugh | Aug 2, 2016 | Tutorial - Blue Team
Introduction This is the second post in our series on Information Security Management. In the first post of the series we discussed the importance of having upper level support for your information security program. In this post we will discuss the actual structure of...
by hatelaugh | Jun 14, 2016 | Tutorial - Blue Team
This is the first post in a series designed to help information security professionals build an InfoSec program from scratch, or to help people find ways to improve their existing programs. Information security management is a daunting task, and understanding and...
by Ray Ancel | Jun 7, 2016 | Tutorial - Blue Team
Blue Teaming for a CCDC event is a harrowing experience. You are thrown into an unknown environment with patchy documentation and some client machines with which to access servers, and the full knowledge that you’ve got mere hours before the much more experienced Red...
by Tyler Butler | May 3, 2016 | Tutorial - Blue Team, Tutorial - Red Team
When I’m on an engagement, one of my favorite value-adds for a client is conducting an informal password audit. While most organizations have realized the importance of maintaining password standards, most overestimate how secure their users’ passwords are...
by Tyler Butler | Mar 29, 2016 | Tutorial - Blue Team
With our ever-increasing reliance on the Internet for interpersonal relationships, it comes as no surprise that the use of social media has gained steam for professional relationships as well. Any new form of relationship-building tools, especially digital tools, are...