Cyber Defense

Cyber Defense

Anticipatory Active Defenses by Bryce Galbraith

We IT pros often commiserate about our struggles to implement effective security within our organizations, butAPTs have no sympathy for our challenges and frustrations. They know we struggle; they're counting on it. They know application whitelisting in full lockdown is hard to implement. They know passwords are the bane of security. They know most organizations … Continue reading Anticipatory Active Defenses by Bryce Galbraith

Announcing the online winners of...

The Final Cyber Defense Challenge 2015 Leaderboard

FAQ on Law of Active Defense by Attorney Benjamin Wright

Q: Is Active Defense a well-defined topic in law and professional ethics? A: No. A great deal of cyber law, including Active Defense, is not well-defined. In cyber law, there is never a 100% guarantee that legal authorities will reach any particular conclusion about any particular activity. Legal understanding of topics like infosec and cyber … Continue reading FAQ on Law of Active Defense by Attorney Benjamin Wright

PowerShell Protect-CmsMessage Example Code, Limitations and Errors

PowerShell Protect-CmsMessage and Unprotect-CmsMessage provide an easy way to use RFC 5652 public key encryption of your data. This article gives example PowerShell code, and talks about limitations, issues, problems, error messages, and how to get around some of them.

SANS Cyber Defense Challenge 2015 #ActiveDefense Twitter Chat

Invite_TwitterChat_WEB1-page-0821