DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology Lenny zeltser social engineering attacks

Why bother breaking down the door if you can simply ask the person inside to let you in? Social engineering works, both during penetration testing and as part of real-world…

Technology Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser

1. Authored by Anton Chuvakin (chuvakin.org) and Lenny Zeltser (zeltser.com). Reviewed by Anand Sastry. Distributed according to the Creative Commons v3 “Attribution”…

Documents MIT EA Presentation.pdf

© 2006 MIT Sloan CISR â Ross Center for Information Systems Research Enterprise Architecture as StrategyEnterprise Architecture as Strategy This research was made possible…

Technology Introduction to Memory Analysis

1. EmilTan Team Lead, Co-Founder http://edgis-security.org @EdgisSecurity Introduction to Memory Analysis 2. Agenda  What can you find in the memory?  Why perform memory…