In this episode we discuss three articles. First, a brief summary of security planning in mergers and acquisitions. Second, what's most important during a security incident? Finally, PROCESS GHOSTING!
Article 1 - How to Plan Your M&A Security Strategy
Supporting Articles:
Marriott data breach FAQ: How did it happen and what was the impact?
Why Evaluating Cybersecurity Prior to Mergers and Acquisitions is Necessary
Article 2 - Mission Critical: What Really Matters in a Cybersecurity Incident
Supporting Articles:
Malware Archaeology Logging Cheat Sheets
NIST 800-61: Computer Security Incident Handling Guide
Article 3 - Researchers Uncover 'Process Ghosting' — A New Malware Evasion Technique
Supporting Articles:
Process Doppelganging: New Malware Evasion Technique Works On All Windows Versions
Herpaderping: Security Risk or Unintended Behavior?
Submitted Github issue to allow ProcessHacker to detect these methods of evasion
As always, please subscribe on your favorite podcast app, and rate and review so that other people will come to know and love us as much as our mothers do
In this episode, we discuss conferences. What are they? When should you go? Which ones should you go to? Included is some discussion of...
Cofense released their annual State of Email Security 2023 report, so we take a deep dive and see what it has to offer. A...
Russia Meddling was not quite as bad as originally thought, Federal agency passwords are weak, digital license plates are a terrible but cool idea,...