By This Author
What is normal? Profiling System32 binaries to detect DLL Search Order Hijacking What is normal? Profiling System32 binaries to detect DLL Search Order Hijacking
June 3, 2021
Threat detection Testing adversary technique variations with AtomicTestHarnesses Testing adversary technique variations with AtomicTestHarnesses
October 28, 2020
Testing and validation Upended Overnight: Facing Threats to Banking and Finance Webinar
Webinars| Stories from the field
Upended Overnight: Facing Threats to Banking and Finance Webinar Testing initial access with “Generate-Macro” in Atomic Red Team Testing initial access with “Generate-Macro” in Atomic Red Team
August 29, 2019
Testing and validation Tracking driver inventory to unearth rootkits Tracking driver inventory to unearth rootkits
June 27, 2019
Threat hunting Four tools to consider if you’re adopting ATT&CK Four tools to consider if you’re adopting ATT&CK
April 17, 2019
Security operations How to Test Your Security Controls Using Atomic Red Team
Webinars| Atomic Red Team
How to Test Your Security Controls Using Atomic Red Team 5 Ways Carbon Black Response Data in Splunk Can Improve Your Security
Webinars| Carbon Black Response
5 Ways Carbon Black Response Data in Splunk Can Improve Your Security