Mastering Threat Hunting Operations: A Deep Dive into Recon InfoSec’s Approach Watson Brown In today’s rapidly evolving cyber threat landscape, proactive defense is no longer optional—it’s...
Audit Active Directory Attack Paths with Bloodhound Eric Capuano In our experience working with SMB and enterprise IT teams, it is often unknown just how far and...
Every Organization Needs Centralized Logging Eric Capuano Logs are on the systems, why do I need this? Because Digital Forensics & Incident Response is...
Scaling Enterprise Forensic Timelining Eric Capuano In July, Eric & Whitney gave a talk titled "Breaches Be Crazy" at the SANS DFIR Summit outlining...