Elastic Security has opened its detection rules repository to the world. We will develop rules in the open alongside the community, and we’re welcoming your community-driven detections. ...
Within days after a report detailing the GoldenSpy malware operation targeting organizations doing business in China, an uninstaller was pushed to affected systems to completely remove the ...
Lose that winner takes all mentality and build your negotiation muscle with advice from security leaders and negotiation experts.
Quickstart Guide to MITRE ATT&CK™ The Do's and Don’ts when using the Matrix [Version 2.0]
TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.
A day hardly goes by without hearing about another ransomware attack. Just this week I read, on SANS NewsBites, that University of California San Francisco (UCSF) paid $1.1 million to ...
TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.
Register for the event and preview Red Canary's talk schedule, which include topics relevant to digital forensics and incident response professionals.