RAM dump: Understanding its ­­­importance and the process

July 31, 2023 | Kushalveer Singh Bachchas

The content of this post is solely the responsibility of the author. LevelBlue ...

What is an incident response plan (IRP) and how effective is your incident response posture?

July 07, 2023 | Marcaé Bryant

As everyone looks about, sirens begin to sound, creating a sense of urgency; ...

What is the difference between incident response & threat hunting?

July 05, 2023 | Mark Stone

The content of this post is solely the responsibility of the author. LevelBlue ...

Digital dumpster diving: Exploring the intricacies of recycle bin forensics

June 20, 2023 | Kushalveer Singh Bachchas

The content of this post is solely the responsibility of the author. LevelBlue ...

Cloud forensics - An introduction to investigating security incidents in AWS, Azure and GCP

April 13, 2023 | Chris Doman

The content of this post is solely the responsibility of the author. LevelBlue ...

Insights from an external incident response team: Strategies to reduce the impact of cybersecurity attacks

March 13, 2023 | Alex Vakulov

The content of this post is solely the responsibility of the author. LevelBlue ...

What is firewall optimization?

March 06, 2023 | Keith Thomas

Firewall optimization (also known as firewall analysis) is the process of ...

5 Things to Know About Digital Forensics and Incident Response (DFIR)

December 16, 2022

Trustwave SpiderLabs is among the most well-respected teams in the ...

2023 Cybersecurity predictions

December 13, 2022 | Theresa Lanowitz

Cybersecurity is a relatively new discipline in the realm of computing. Once ...

Prepare, respond & recover: Battling complex Cybersecurity threats with fundamentals

November 08, 2022 | Robert Woods

The cybersecurity industry has seen a lot of recent trends. For example, the ...

11 Cybersecurity investments you can make right now

October 27, 2022 | Anas Baig

This blog was written by an independent guest blogger.

Privileged account management challenges: comparing PIM, PUM and PAM

November 18, 2021 | Alex Vakulov

This blog was written by an independent guest blogger.

Incident Response Methodology: The OODA Loop Explained

January 24, 2019 | James Fritz

An incident response methodology can be explained as a collection of procedures ...

Incident Response Automation Challenges (and How USM Anywhere Can Help)

July 10, 2017 | Julia Kisielius

According to the SANS 2017 Incident Response Capabilities Survey, 47% of ...

Incident Response Orchestration: What Is It and How Can It Help?

May 30, 2017 | Julia Kisielius

The other day, I invited about twelve friends to my apartment for dinner—on a ...

Beginner’s Guide to Open Source Incident Response Tools and Resources

February 21, 2017 | James Fritz

**OSSIM is no longer in use as we focus on delivering enhanced solutions for ...

Digital Forensics According to the FORZA Model and Diamond Model for Intrusion Analysis

September 06, 2016 | Alissa Knight

The Bridge on the River Forza We can teach these barbarians a lesson in Western ...

Incident Response Checklists

August 10, 2016 | Denny LeCompte

Incident response checklists are an essential part of responding to security ...

2016 SANS Survey on Incident Response

June 19, 2016 | Kate Brew

AlienVault helped fund the 2016 SANS Incident Response Survey. We find that ...