Blog

38 Results / Page 1 of 5

Background
2025 Hacker's Gift Guide

todayOctober 29, 2025

close

Blog Valiant Puck

Hack the Halls! It’s our 2025 Hacker’s Holiday Gift Guide

Ho Ho Holy Hackers, Batman! Enter our White Hat Wonderland as we check out some of 2025’s hottest gifts for the hacker or cybersecurity pro in your life. That’s right… Welcome to the 2025 Hacker Christmas Gift Guide, where boring socks and fruitcakes go to die. This is the ultimate list ...

Reduce false positives in your SOC

todayOctober 9, 2025

close

Blog Andrew Hickman

From Alert Overload to Actionable Insights: Conquering False Positives in Your SOC

In the fast-paced world of cybersecurity, security operations centers (SOCs) are the frontline defenders against an ever-evolving threat landscape. Picture this: It’s 2 a.m., and your SOC analyst is staring at a screen flooded with alerts, hundreds, maybe thousands, pinging in relentlessly. Malware detections, suspicious logins, anomalous network traffic. But ...

todaySeptember 18, 2025

close

Blog Alias

Beyond the Ban List – A Framework for Third-Party App Risk

As of September 2025, TikTok remains in legal limbo in the United States. A framework deal is reportedly in progress that would transfer TikTok’s U.S. operations to a consortium of American investors, including Oracle and Silver Lake. While this may preserve the app’s availability, it underscores a deeper shift in ...

Fear of Hacking at DEF CON Vegas Part 2

todayAugust 27, 2025

close

Blog Valiant Puck

Fear of Hacking at DEF CON Vegas: Part 2

Editor’s note: Following is part two of Valiant Puck’s report from DEF CON 33. As said last week, it is based off of real events, but elements may be exaggerated or even fictionalized. It’s up to you, the reader, to decide for yourself what is real and what is not. ...

Fear of Hacking at DEF CON Las Vegas

todayAugust 20, 2025

close

Blog Valiant Puck

Fear of Hacking at DEF CON Vegas: Part 1

The Signal and the Sand: My Mythic Descent into the World’s Largest Hacker Conference. The following is based off of real events, but elements may be exaggerated or even fictionalized. Editor’s note: It’s been one week since Valiant Puck returned from his assignment in Las Vegas. This blog was supposed ...

How private digital forensics can uncover more in investigations

todayAugust 14, 2025

close

Blog Alias

What to Do When Law Enforcement Doesn’t Provide Answers: The Role of Private Digital Forensics in Your Case

When a law enforcement agency (LEA) investigates an incident—whether it’s a suspicious death, a cybercrime, or an allegation involving digital forensics evidence—families, defendants, or legal teams often expect transparency, thoroughness, and timely communication. Unfortunately, that’s not always the case. Many people experience frustration when investigations appear incomplete or when key ...

Incident Response: Your guide to the cybersecurity championship

todayJuly 17, 2025

close

Blog Donovan Farrow

Incident Response: Your Guide to the Cybersecurity Championship 

Warning: What follows is an example of a real-life ransomware attack and the resulting incident response. Picture this: you’re cruising through your usual workday, coffee in hand, inbox under control, when suddenly ring! ring! you get a call from a co-worker. They can’t access a file on the shared drive. ...