Last week I looked at some creative uses of log analysis for detecting malware, and ways to acquire Windows physical memory for analysis. What I've seen time and time again is where those in charge of ...
Why: "Proactive threat hunting shifts the mindset from reacting to an attack after it happens to actively looking for suspicious behavior before damage is done. " Register to attend TechMentor by June ...
SACRAMENTO, Calif., Jan. 8, 2014 /PRNewswire/ -- In a move to significantly close the gap between discovery and mitigation of targeted attacks, HBGary, a part of ManTech International Corporation, ...
Microsoft has unveiled Project Freta, a potential future virtual-machine (VM) forensics service that will allow anyone to automatically ferret out malicious software hiding in memory on cloud ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results