Sign up for F15hb0wn.com blog updates
School of NBAD Series: NBAD Signature Detection
In the second part of the NBAD series, signature detection methodologies are examined.
School of NBAD Series: History of NBAD
The first part in this series covers the history of Network Behavioral Anomaly Detection (NBAD.)
When An Alarm Isn’t
Vendors like to create an ocean of alarms in their products so they can dogpile after an event and claim that "they caught it." This article goes through the dangers of false positives in incident response and how to address them.
Dealing with Insider Threats
The most dangerous and difficult risk to detect to an organization is insider threat. When a trusted asset decides to betray the trust of his benefactor for the sake of ideology, greed or extortion the organization can suffer long lasting damage. This article outlines the nature and strategies of handling insider threat.
Processing IOCs in the StealthWatch System
Threat data contained in Indicators of Compromise (IOC) can be applied against the data stored in StealthWatch to look for markers of historical breach. This entry outlines the steps in performing this analysis.
Protecting Windows XP from Exploit
With Microsoft discontinuing support of Windows XP, organizations need guidance on how to protect the legacy machines they can't replace.
Parsing Vendor Claims of APT Detection
How to parse the claims vendors make in APT detection.
Reigning in External Services with NetFlow
NetFlow analysis can be an effective way of determining what cloud services are in use and monitoring them for violations.
Grand Rapids ISSA Deck
Thanks to the Grand Rapids chapter of the ISSA for hosting me today. My deck can be downloaded here.