Recent Posts
-
NIST 800-61 – Detection and categorisation of incidents based on impact and recoverability.
Detection: Recognizing the Signs of an Incident Detection is the first crucial step in handling security incidents. The effectiveness of detection largely depends on the tools and systems you have […]
-
NIST 800-61 – Detection
Detecting cybersecurity incidents effectively involves multiple layers of detection, which can vary based on the tools and configurations you have in place. This includes intrusion detection systems (IDS), intrusion prevention […]
-
Breaking into a Cybersecurity Career: Training, Resources, and Tips
If you’re considering a career in cybersecurity, now is an excellent time to dive into this dynamic and ever-evolving field. With an abundance of training options available, you can find […]
-
The Importance of Preparation in Cyber Incident Response
In DFIR, one of the worst situations is facing a cyber incident unprepared. Imagine the chaos (or don’t, as it’s a reminder of the last big incident) when you’re looking […]
-
RDP Digital Forensics
Forensicating RDP: Remote Desktop Protocol (RDP) is an integral part of Windows OS, allowing users to connect remotely to other systems. However, its exposure to the internet can (and often […]
-
Australian Information Security Manual Updates – March 2024
Trust but verify. The famous quote by Ronald Reagan was formed from a Russian Proverb. This was life in 1987. In 2024, life in the new threat landscape is Zero-Trust. […]
-
Evidence Acquisition, Memory Forensics, Windows Forensics
Basic Digital Forensics Process
I’ve shared this on Linkedin just yesterday 22 April 2024, but here I can provide a little more context. Before doing this work, it helps if you’ve followed the NIST […]
-
The core of all reporting
I had planned to write a one-liner for this post, but I think it deserves more context.The point of reporting is to tell a story, one that flows. This piece […]
-
Booting stalkers / abusive partners from your digital accounts
This is a work in progress, but has the fundamentals of what you should do. Apologies for the jargon that’s included, I would recommend sharing this with the person who […]
-
Uncategorized, Windows Forensics
Evidence of file execution
Don’t Deny It! When you were a child, did you ever do something that you shouldn’t have, and when caught and subsequently questioned by your parents as to whether you […]