Attending Black Hat? Join Crowdstrike, Halcyon, Hunters and Beazley Security at the Foundation Room, Tuesday, August 6 · 6 - 9pm.
Hans Christoph’s Post
More Relevant Posts
-
SEE CROWDSTRIKE COUNTER ADVERSARY OPERATIONS IN ACTION This video shows the power of the CrowdStrike Platform, and how we unify operations, to enable SOC teams to respond at lightning speed. This is pretty cool! https://lnkd.in/ezccMCDV #cybersecurity
See CrowdStrike Counter Adversary Operations in action | Video
crowdstrike.com
To view or add a comment, sign in
-
Calling all threat researchers: Join us next Wednesday, February 28, @ 2 PM ET for a deep dive into the Stairwell platform with Chris St.Myers and Silas Cutler! Learn how Stairwell helps you enhance your threat research and kick it up a notch, including topics like: - Searching across your private environment for indicators of compromise (IoCs) - The various ways you can upload malware samples to the platform for analysis - YARA rules and hunting across every single file - Finding previously unknown variants using Stairwell’s Variant Discovery tool - Much, much more! Register here: https://lnkd.in/g6Xj3zw5 #ThreatResearch #ThreatIntelligence #MalwareAnalysis
Stairwell deep dive with Chris St. Myers and Silas Cutler
https://stairwell.com
To view or add a comment, sign in
-
Global CISO - Cybersecurity & Technology Executive | Security | Privacy | Compliance | Operations | Consultant | Advisory | Coach
When we think of critical infrastructure, we tend to focus on energy, communications, transportation. Kyle Waggoner, CISO at Perdue Farms, reminds us that protecting the food supply chain is absolutely critical to national security as well. @perdue far #cybersecurity #criticalinfrastructure #foodsecurity
Seeking CyberMaryland. Networking, Learning, & Building Relationships. Kyle Waggoner, Perdue Farms. by Cybercrime Magazine
soundcloud.com
To view or add a comment, sign in
-
🔒 Safeguard First, Hunt Later! 🔎 Before embarking on a threat hunting journey, make sure your entire infrastructure is rock-solid. Secure the foundation, then seek the shadows. Don't just take our word for it. Our partner Corelight Federal Chief Technology Officer Jean Schaffer explains! Check out her talk here: https://hubs.la/Q025q3-q0 #getnetworkvisibility #corelight #cybersecurity #secureinfrastructure"
Corelight's Jean Schaffer emphasizes securing entire infrastructure before moving to threat-hunting phase
https://cyberscoop.com
To view or add a comment, sign in
-
Spotting malicious traffic is key for network safety. JA3 fingerprinting—a clever technique used in threat hunting, incident response, and network forensics—supports this effort. ⚠️ But watch out: threat actors have started using JA3 randomization to avoid being caught! Discover how JA3 works, what it’s used for, and the latest evasion techniques you need to keep an eye on.
Enhancing Network Security with JA3
keysight.com
To view or add a comment, sign in
-
When it comes to evaluating security controls, we believe the devil is in the details. Our Purple Team experts leverage our research & tradecraft knowledge to generate a set of test cases that provide a representative sample of the possible variations of each target behavior. Learn more: https://ghst.ly/45nDgPn
To view or add a comment, sign in
-
The history of #ZeroTrust tells us that success is possible. #ZTA See the Teiss article featuring John Linford, The Open Group Forum Director, Security & OTTF here:
To view or add a comment, sign in
-
Endpoint Security Demigod 😉 | Senior Consultant | Cybersecurity Engineer | Veteran, CCFA, TCO, TCS, CrowdStrike, Tanium, SentinelOne
At Optiv, we understand that the speed of business is surpassed by one thing only: the hurricane force of malicious threat actors mounting against it. That’s why you need Optiv, the cyber advisory and solutions leader, by your side. A single partner for all your #Cybersecurity needs. 💡 Turn to @Optiv. Together, we help secure your full potential. #OneOptiv
Optiv's Letter to the Board in the Wall Street Journal
social.optiv.com
To view or add a comment, sign in
-
Add it to the list! #Cohesity is now #StateRAMP Authorized! This marks a new era of security, resilience, and trust for state and local governments. Check out the blog post by our SLED leader, Brian Coffey https://lnkd.in/gCdjZEUX
To view or add a comment, sign in
-
-
Trusted Advisor | Thought Leader | Creative Communicator | Association of Threat Assessment Professionals (ATAP)
It's the real thing! Yep, these scavenger hunt prizes are real. Thanks, Karen Flowers, for the Coca-Cola Global Security challenge coin and other groovy prizes! If you're at #WinterConference24 next week, find me near registration. It's going to be epic! Association of Threat Assessment Professionals (ATAP) #WinterConference24 #ThreatAssessment #WomenInSecurity #WomenInThreat
To view or add a comment, sign in
-
Let’s go