DivyIntroduction to Memory ForensicsAs a cyber defender, one of the key skills is to know how to quickly perform memory analysis. While security tools can provide valuable…Jul 13, 2023Jul 13, 2023
DivyA Beginners Guide to Incident Response ProgramAdversaries are targeting businesses in hopes of making millions. The only thing standing between them and the enterprises is the blue team…Aug 9, 2022Aug 9, 2022
DivyEmpowering Investigation and Analysis: VisualizationTimes are changing. Cyberattacks are now a reality people are waking up to. Every day Security analysts are fighting battles against…Aug 8, 2022Aug 8, 2022
DivySecurity is not always about going with the trendRecent trends in cybersecurity revolve around technology. Every day a new term is invented and thrown into the market. In reality…Aug 4, 2022Aug 4, 2022
DivySOC’s Engine: Incident Handling ProcessThere is a saying that “if you drop the catch, you will lose the match”. While the saying is about cricket, it is also relevant to…Aug 3, 2022Aug 3, 2022
DivySecurity lessons taught by PandemicCovid19 pandemic was an eye-opener for the whole world. Nature unleashed its true power and shattered multiple illusions. It will take us…Aug 2, 2022Aug 2, 2022
DivySecuring against the Opportunistic AttacksThe cyber-world is a land of opportunism. Adversaries are launching multiple attacks and getting lucky. Enterprises are so focused on…Aug 1, 2022Aug 1, 2022
DivyA Beginners Guide to Incident Response PlanIt is not a question of if but when. The quote best describes the current situation of cyberattacks. Being ready is not an option but a…Jul 28, 2022Jul 28, 2022
DivyAre your Security Operations Intelligent?Without context, Information is just data while with context it is a powerful tool. Security Operations being managed without context are a…Jul 26, 2022Jul 26, 2022
DivyTriaging RansomwareIt’s 2 am. You are on a conference bridge for the last 18 hours, trying to identify how the ransomware is propagating. You have cut off…Jul 25, 2022Jul 25, 2022