Understanding the Principle of Least Privilege

Principle of Least Privilege

The Jurassic Park Lesson The Principle of Least Privilege is the principle that users and programs should only have the necessary privileges to complete their tasks. In the case of Jurassic Park, this whole situation could have been avoided if they had applied the principle of least privilege throughout the systems in the park. Sure, Dennis…

Read More

Malware Analysis of the Emotet Banking Trojan

Current Day Heist Ever since I can remember, my Dad has always loved watching heist movies. Whether it was Ocean’s 11, Catch Me If You Can, National Treasure, or the Italian Job, if there is a heist movie on TV, he’s watching it, and more than likely changing the channels during the commercials if there…

Read More

A Day in the Life… Cybersecurity Edition

Image of Cyber Engineer

Beyond the Hollywood Hacker A hooded figure sits at a small desk in complete darkness with just the light of the computer screen dimly illuminating the outline of their face as they furiously pound away at their keyboard. Suddenly they stop typing and in an ominous voice exclaim “I’m in!” For most people when they…

Read More

Identifying and Reporting Cybersecurity Incidents

Image of Cybersecurity Investigators Guide

Discover how to best identify and report cybersecurity incidents! Knowing what to look for when evaluating a potential cybersecurity incident and being prepared to handle a cybersecurity incident is extremely important in today’s world, when a majority of incidents go unreported.

Read More

5 Steps to Protect PII

Image of 5 Steps to Protect PII Presentation Title Page

A Practical Guide For Protecting Our Most Important Information It seems that week after week there is a new story in the news about yet another company suffering a data breach. It has become so commonplace now that only the truly large breaches make the headlines. But despite truly staggering numbers of data breaches, many…

Read More