brencroninOct 27, 20248 min readIncident Response (IR) - Server/Host AnalysisHost based IR Approach The main categories of alerts come from the following sensor instrumentation: Network sensors Identity sensors...
brencroninOct 25, 20232 min readVulnerability Management - Fragile ScanningCertain devices are considered 'fragile' where aggressive vulnerability scanning could have a risk of impacting the availability of the...
brencroninOct 23, 20234 min readVulnerability Management - Tracking & TreatingIn a previous article I highlighted a framework for vulnerability management program, developed by SANS instructors Jonathan Risto and...
brencroninOct 21, 20236 min readVulnerability Management - Vulnerability PrioritizationIn a prior article, I introduced a vulnerability management program framework known as P.I.A.C.T., developed by SANS instructors Jonathan...
brencroninOct 15, 20237 min readVulnerability Management - The Homonymy of "Scanning"One of the most frequently used terms in cybersecurity is "Scanning." However, this term can encompass various meanings within the...
brencroninOct 9, 20232 min readVulnerability Management Program OverviewLet's face it, vulnerability management is a pain! In an online SANS article titled "Vulnerability Management Maturity Model Part I"...