tellagraff.com
Application Security
http://tellagraff.com/application-security
Tellagraff, LLC - Former Nasdaq CISO, Mark Graff. Media & Events. Application security is the art and practice of designing, implementing, and operating enterprise applications so that they are resistant to cyber tampering. That sounds simple, but is a very difficult result to achieve. We can examine your applications to find exploitable security vulnerabilities. And advise on toolsets you should be using. Jan 13, 2016. Too Good to be True. Dec 15, 2015. Why can't we have nice things? Nov 25, 2015. In th...
tellagraff.com
History - Tellagraff, LLC - Former Nasdaq CISO, Mark Graff
http://tellagraff.com/history
Tellagraff, LLC - Former Nasdaq CISO, Mark Graff. Media & Events. Leaders of the firm, headquartered in New York have been delivering cyber risk management services to corporate executives and government leaders since 1992. With fully trained CISOs in high demand, the team at Tellagraff offers an in-depth training course for companies that need to stay on top of the current trends in cyber security and for those who want to understand the threats still not known. Jan 13, 2016. Too Good to be True. Graff&...
tellagraff.com
Events Archive - Tellagraff, LLC - Former Nasdaq CISO, Mark Graff
http://tellagraff.com/events
Tellagraff, LLC - Former Nasdaq CISO, Mark Graff. Media & Events. A running Vlog by Mark Graff, CEO of Tellagraff. Too Good to be True. January 13, 2016. Spies and criminals use sex to lower your cyber defenses. The proof is in my inbox. For more Cyber Minutes please check out tellagraff.com. The Philosopher’s Demon. December 15, 2015. Why can’t we have nice things? For more CyberMinutes, please visit Mr. Graff’s YouTube channel HERE. Filed Under: Cyber Security. November 25, 2015. Good People, Bad Code.
clicksecurity.github.io
Data Hacking by ClickSecurity
http://clicksecurity.github.io/data_hacking
Examples of using IPython, Pandas, and Scikit Learn to get the most out of your security data. Project maintained by ClickSecurity. Hosted on GitHub Pages — Theme by mattgraham. Welcome to the Click Security Data Hacking Project. Hacking in the sense of deconstructing an idea, hardware, anything and getting it to do something it wasn’t intended or to better understand how something works.". Questions or Comments: clicklabs [at] clicksecurity.com. Scikit Learn ( http:/ scikit-learn.org.
digirati82.com
Drivers | digirati82
https://digirati82.com/tag/drivers
Windows Logging Service (WLS), DFIR, etc. WLS Licensing and Questions. Adding HFS read support to Windows. Recently I had a coworker request the ability to read an HFS formatted drive with Windows. I found a few scattered articles that pointed to Apple’s “Boot Camp Support Software” including an HFS driver, and it does. How to add read only HFS support to Windows (64-bit) using Apple’s HFS drivers. Download the latest “Boot Camp Support Software”. Http:/ support.apple.com/kb/DL1721. Click to email (Opens...
digirati82.com
Boot Camp Support | digirati82
https://digirati82.com/tag/boot-camp-support
Windows Logging Service (WLS), DFIR, etc. WLS Licensing and Questions. Tag Archives: Boot Camp Support. Adding HFS read support to Windows. Recently I had a coworker request the ability to read an HFS formatted drive with Windows. I found a few scattered articles that pointed to Apple’s “Boot Camp Support Software” including an HFS driver, and it does. How to add read only HFS support to Windows (64-bit) using Apple’s HFS drivers. Download the latest “Boot Camp Support Software”. Opening the msi with Orca.
digirati82.com
WLS 3.3 Released | digirati82
https://digirati82.com/2015/05/04/wls-3-3-released
Windows Logging Service (WLS), DFIR, etc. WLS Licensing and Questions. Burn folder support for FileMonitor. Log file metadata for files found in command line parameters and event logs. Fixed (non-removable) disk monitoring. Network location awareness by joined domain. Optional host name set by DNS resolution. Optional alternate static host name. Monitoring UDF optical media changes. Support for non-FIPS hashing algorithms when FIPS mode is enabled. Suspended process checking (potential process hollowing).
digirati82.com
Uncategorized | digirati82
https://digirati82.com/category/uncategorized
Windows Logging Service (WLS), DFIR, etc. WLS Licensing and Questions. Monitoring downloaded file execution: WLS Bro Splunk. Does awesome things with network data. One of those things is performing an analysis of files. On the wire, including hashing. WLS does hashing of executed files and loaded DLLs, and tracks each hash that has been seen on the host, setting “NewHash=True” for the first instance. Internet Explorer Zone Number Mapping. A macro that limits the logs to indexes where WLS data is contained.
tellagraff.com
Incident Response - Tellagraff, LLC - Former Nasdaq CISO, Mark Graff
http://tellagraff.com/incident-response
Tellagraff, LLC - Former Nasdaq CISO, Mark Graff. Media & Events. Incident response is an organized approach to addressing and managing the aftermath of a security breach or an attack. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. How would you go about doing this? It’s by being prepared and having an incident response plan in place. An organized approach to managing the aftermath. Of a security breach, limiting damage and reducing costs. Jan 13, 2016.
SOCIAL ENGAGEMENT