PRESENTATIONS

How Did That Happen?

Network Forensics Case Studies 1. Troubleshooting vs. Forensics 2. Case Study #1 – Application Based Attacks / Exploits 3. Case Study #2 – Bot’s and Botnets – Zbots Zbots & Mirai & Mirai & Mirai […]

ARTICLES

The Security Nightmare From Beyond

Phill ‘Sherlock’ Shade The Time – Not so long ago The Location – A Galaxy unfortunately all too nearby The Crime – Data Breach / Industrial Espionage This particular event transpired approximately three years ago; the client was […]