Video Screencast Help

Cyber Security Group

Results for Cyber Security Group

         The term incident response means a lot of things to a lot of people. Historically, words like “unpleasant” or “chaotic” come to mind when thinking about the last time many organizations responded to the suspicion of a compromise by ...
Blog Entry by Clint M. Sand | 05 Aug 2014 | 1 comment
I have a calendar alert goes off at 9:30 AM to “Reach out to Layer 8”, which is a little project I devised for myself. When the reminder fires, I open a file called “Friends.txt” that contains several people’s names, departments and phone numbers. ...
Blog Entry by Matt Sherman | 04 Aug 2014 | 4 comments
In the previous installment we examined default Apache logging. Now let's pump up the default Apache combined log format in order to supercharge forensic capability! We'll utilize the "LogFormat" directive in order to define ...
Blog Entry by Vince Kornacki | 04 Aug 2014 | 0 comments
The term live response is being heard more and more frequently but what exactly is it and how does it differ from traditional forensics. Live response and traditional forensics have a lot in common in that they both are looking for similar ...
Blog Entry by Jamie Porter | 04 Aug 2014 | 6 comments
Yara is a tool that Symantec uses on incident response engagements in order to help us respond quickly and triage hosts while our security team is prepping signature updates for our affected clients. Yara is very popular tool among security ...
Blog Entry by Trent Healy | 04 Aug 2014 | 7 comments
When the kids at the schools where I speak ask me what I do for a living I don't tell them I postulate about quantifying the loss of opportunities when we delay a response to an incident or malicious cyber-attack. I tell them I help the world ...
Blog Entry by Robert Shaker | 04 Aug 2014 | 0 comments
Welcome to the first of a series of blog posts on Malware Evolution. Through the series we’ll be covering modern malware types including bots, denial of service attacks, Ransomware and banking Trojans. We will look at the tactics and trends that ...
Blog Entry by Bob Burls | 04 Aug 2014 | 0 comments
Like an unsightly beer belly, default Apache logging functionality leaves a little something to be desired, especially with regard to forensic capability. So let's pump up the default Apache logging functionality and carve out a forensic six ...
Blog Entry by Vince Kornacki | 04 Aug 2014 | 0 comments
In my last post in this series I introduced Time of Incident Detected (TID) – Time to Call for Assistance (TCA) = Delta Time (DT) = Lost Opportunity (LO) and defined what TID and TCA meant in this equation. In today’s post I’d like to explain ...
Blog Entry by Robert Shaker | 04 Aug 2014 | 0 comments
We have decided to combine two of the blogs populated by the security analysts from various disciplines within Symantec’s Cyber Security portfolio to create a single location, with the intent to make it easy for readers to keep in touch with interesting ...
Blog Entry by Jeannie Warner | 03 Aug 2014 | 0 comments