Cyber Defense: Category - Active Defense

Anticipatory Active Defenses by Bryce Galbraith

We IT pros often commiserate about our struggles to implement effective security within our organizations, butAPTs have no sympathy for our challenges and frustrations. They know we struggle; they're counting on it. They know application whitelisting in full lockdown is hard to implement. They know passwords are the bane of security. They know most organizations … Continue reading Anticipatory Active Defenses by Bryce Galbraith


FAQ on Law of Active Defense by Attorney Benjamin Wright

Q: Is Active Defense a well-defined topic in law and professional ethics? A: No. A great deal of cyber law, including Active Defense, is not well-defined. In cyber law, there is never a 100% guarantee that legal authorities will reach any particular conclusion about any particular activity. Legal understanding of topics like infosec and cyber … Continue reading FAQ on Law of Active Defense by Attorney Benjamin Wright


New SANS 550 Cyber Security Course Teaches Active Defense, Offensive Countermeasures, and Cyber Deception to IT Security Professionals

Because traditional counter defenses are no longer effective in stopping malware, viruses, and other attacks-it is a forgone conclusion that targeted organizations will be compromised. New tactics are needed to stop the attackers and go beyond simple "defense" techniques. The SANS Institute is pleased to announce the newest course available to information security professionals, SEC … Continue reading New SANS 550 Cyber Security Course Teaches Active Defense, Offensive Countermeasures, and Cyber Deception to IT Security Professionals


What you Need to Know about Active Defense and Threat Intelligence

by, John Strand There has been a lot of discussion about threat intelligence lately. The idea is that other organizations who get hacked or attacked should share the techniques and malware used by the attackers with the public to stop it from happening again. So, it kind of sounds like a more complicated implementation of … Continue reading What you Need to Know about Active Defense and Threat Intelligence


Active Defense: Entice Attackers and implement effective Offensive Countermeasures by deploying HoneyDocs

By, John Strand, Sr. Instructor at SANS Institute In incident response there is an odd play of realities. We know we have been hacked, we may even know where the command and control (C2) server is located. But knowing the actual IP address of the attacker is somewhat of a distant dream of security pros. … Continue reading Active Defense: Entice Attackers and implement effective Offensive Countermeasures by deploying HoneyDocs