Cyber Defense: Tag - cybersecurity

Q & A with John Hubbard, SOC Manager and SANS Instructor

Our Industrials & Infrastructure team had a chance to sit down with John Hubbard (@SecHubb), GlaxoSmithKline SOC Manager, SANS Author and Instructor, and dedicated Blue Teamer. ____________________________________________________________________________________ SANS: What made you choose to work in tech/security? John: I love this industry because there's always a fresh challenge to be solved. Attacks are constantly evolving, … Continue reading Q & A with John Hubbard, SOC Manager and SANS Instructor


Anticipatory Active Defenses by Bryce Galbraith

We IT pros often commiserate about our struggles to implement effective security within our organizations, butAPTs have no sympathy for our challenges and frustrations. They know we struggle; they're counting on it. They know application whitelisting in full lockdown is hard to implement. They know passwords are the bane of security. They know most organizations … Continue reading Anticipatory Active Defenses by Bryce Galbraith


What you Need to Know about Active Defense and Threat Intelligence

by, John Strand There has been a lot of discussion about threat intelligence lately. The idea is that other organizations who get hacked or attacked should share the techniques and malware used by the attackers with the public to stop it from happening again. So, it kind of sounds like a more complicated implementation of … Continue reading What you Need to Know about Active Defense and Threat Intelligence


Active Defense: Entice Attackers and implement effective Offensive Countermeasures by deploying HoneyDocs

By, John Strand, Sr. Instructor at SANS Institute In incident response there is an odd play of realities. We know we have been hacked, we may even know where the command and control (C2) server is located. But knowing the actual IP address of the attacker is somewhat of a distant dream of security pros. … Continue reading Active Defense: Entice Attackers and implement effective Offensive Countermeasures by deploying HoneyDocs