In this episode we discuss three articles. First, a brief summary of security planning in mergers and acquisitions. Second, what's most important during a security incident? Finally, PROCESS GHOSTING!
Article 1 - How to Plan Your M&A Security Strategy
Supporting Articles:
Marriott data breach FAQ: How did it happen and what was the impact?
Why Evaluating Cybersecurity Prior to Mergers and Acquisitions is Necessary
Article 2 - Mission Critical: What Really Matters in a Cybersecurity Incident
Supporting Articles:
Malware Archaeology Logging Cheat Sheets
NIST 800-61: Computer Security Incident Handling Guide
Article 3 - Researchers Uncover 'Process Ghosting' — A New Malware Evasion Technique
Supporting Articles:
Process Doppelganging: New Malware Evasion Technique Works On All Windows Versions
Herpaderping: Security Risk or Unintended Behavior?
Submitted Github issue to allow ProcessHacker to detect these methods of evasion
As always, please subscribe on your favorite podcast app, and rate and review so that other people will come to know and love us as much as our mothers do
As you know, we're always looking for new and interesting reports to discuss, and this time we're discussing the Hype Cycle. It's a report...
This week, David and I review the 2024 Picus Blue Report, in a more timely fashion than the last one. As always, interesting insights....
In our continual search for the most useful Information Security Report, chock full of insight and wisdom, we review the Talos Inaugural Year In...