Malicious Streams

Defending the Enterprise

The design of an information security program is critical to ensuring the team is focused on reducing real risk. This article outlines an information security approach that begins with defending the enterprise in the first few pillars (Data Protection, Vulnerability Reduction, and Automated Defenses) and quickly transitions into taking the fight back to our aggressors (Incident Response & Attribution).

Read Article

The Need For Enterprise IR Analysis Skills

Escalating frequency, sophistication, and consequences ... we all know the story of today’s threat landscape. So how should we combat this increasing threat? Part of the answer lies in our corporate IR teams. We need to morph to meet these challenges by including new skills on our teams. The attached presentation asserts Forensics & Malware Analysis Skills are a growing must to combat the sophisticated threats we face today.

Read Article