Blog tagged as case study

 You are the cyber operations manager for the nation of Gorgas.

The targeting analyst on the other side of the table slides a paper over to you. It details a risk assessment of a proposed operation that will advance your national objectives but requires using some high value bespoke capabilit...

10.10.24 01:39 AM - Comment(s)

Yes, and it is complementary to others like MITRE ATT&CK and NIST. Cyber frameworks like these are limited by their attempt to be holistic. For example, MITRE ATT&CK states right up front that it is a "knowledge base of tactics and techniques based on real world observations." Thi...

18.06.24 03:20 AM - Comment(s)

The words on the console are drenched in red. Red bad.

 

The level 3 SOC team is looking at you with this urgent escalation. They fear an advanced threat actor is moving around the internal network. This critical endpoint happened to have some extra logging enabled and now reports a java app i...

14.06.24 02:31 AM - Comment(s)