Anomalies in an environment's metrics data are an important indicator of an attack. The Prometheus time series database automatically detects, alerts, and forecasts anomalous behavior with the Fourier and Prophet models of the Prometheus Anomaly Detector.
The MITRE ATT&CK and D3FEND knowledge databases provide useful techniques for securing your IT infrastructure.
The danger of ransomware attacks calls for a robust backup and monitoring strategy.
Windows attack surface reduction policies make significant progress in protecting your entire IT infrastructure.
Keep an attacker's connections open in an Endlessh "tarpit" or delay incoming connections with the more traditional rate-limiting approach of tc.
Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.
To thwart credential harvesters at the network interstice, you must understand how attackers exploit browser transactions.
Open source pen testing tools help you view an attack from the perspective of both the attacker and the defender.
The balance between IT threats and IT security is woefully unbalanced in a Windows environment, requiring the enforcement of company-wide security standards.
When you examine the memory of a computer after a break-in, take advantage of active support from the Volatility framework to analyze important memory structures and read the volatile traces of an attack.