Introduction to DFIR
Comprehensive guide to starting a career in Digital Forensics and Incident Response with practical resources.
Comprehensive guide to starting a career in Digital Forensics and Incident Response with practical resources.
Explains the Intelligence Cycle’s six steps with hands-on examples from tracking APT groups.
FIRST 2015 Berlin conference preview with talk recommendations on threat intelligence and incident response.
F3EAD methodology: combining military operations with intelligence cycles for effective incident response.
Step-by-step guide to building custom Maltego transforms with Python examples and automation tips.
A small number of topics get intelligence driven incident responders incredibly frustrated. Using intelligence to mean smart (I’ll share more about that later this week).
Understanding the OODA Loop for faster incident response and security decision-making cycles.
The challenges of cybersecurity attribution: incomplete data, easy spoofing, and avoiding bias in threat analysis.
ChatOps for DFIR: Using Hubot to automate security operations through chat interfaces and GitHub workflows.