Reducing your work load, one post at a time.
At Countercept, we love to share. Whether it’s sharing our latest code for decompiling malware, demystifying the latest news on cyber security, or our best practice for business enablement and minimizing organizational risk, you’ll find it here.
What is good endpoint detection?
What is good log analysis?
Discovering a compromise: Countercept case study
Reacting to cyber attacks
The only effective way to detect and respond to attacks is by having the right people, with the right mindset.
Detection and strategic planning
There are so many places where the attacker could land, so having our eyes on all of them at the same time becomes a very difficult challenge.