Active Cyber Defense: The need for an active cyber defense model (1)

It’s been some time since the first honeypots were developed and the concept of deception contemplated as a potential mechanism to detect, slow down and counter-attack the opponent. We are looking at 15 to 20 years of attempts to embrace cyber deception, almost in parallel in the same amount of time the threat has evolved…

The right ingredients for Threat Hunting

Threat Hunting and training such as GCFA are proving to be beneficial to lower the internal detection and dwell time. Not long ago we were discussing the long time that was taking to do internal detection and average dwell time but this is currently changing. Rob Lee and the SANS Institute in their GCFA update…

Reflections on how to become a cyber security specialist

Watching some videos on youtube I came across the following video, I found it very interesting especially if you are looking to understand how candidates are measured in order to get a job. The author of the video divided very well the areas needed in order to have a stable career in Cyber, Experience Certifications…