A conceptual architecture (not a sales pitch/tech agnostic) to address two key concepts: First to bring external CTI (Cyber Threat Intel) into your environment (security infrastructure) and converting it into a machine-actionable format. Second, to set up sensors and instrumentation to match events in your environment for possible matches across many (all) CTI source indicators.
Up Next in Season 1
-
ESCAPING THE CREATIVE GRIND
We will take a look into the creative process from Undercroft Co-Founder Chris Machowski’s perspective. Just like most projects, there is a specific workflow and method to the madness. We will touch on digital artwork and video editing.
-
BUILDING A SDR BASE STATION WITH RASP...
Now that you have your shiny new Raspberry Pi, you may be asking yourself “what can I do with this thing?” Jonathan last spoke about making an emulation box to play all of your favorite classic games from yesteryear, but now he is back with a new project. Welcome to the Software-Defined Radio, on...
-
INTRODUCTION TO REVERSE ENGINEERING A...
Dr. Bill Gauvin gives the first in a series on this topic. In this session, viewers are introduced to the Portable Executable (PE) file format as it relates to RE and malware analysis. Tools, such as Strings, PEview, Ghidra, and the Windows Visual Studio debugger are introduced to allow the viewe...