Incident Response

Meet The Blue Team

The Unsung Heroes of Infosec An Article Review While cybersecurity continues to be one area of tech that seems to be a perpetual...

The Four Basic Truths of System Security

System Security and Cybersecurity are not the same thing. . . Another one of those Dan's New Leaf Posts, meant to inspire thought about IT Governance . . . . ...

Data Breach Laws: A State-by-State Framework

What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular...

The Enlightening

Kicking Off a Next Generation Incident Response Test Awareness, for TechsAnother one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . ...

Mutiny! The Malicious Insider Threat Webinar Registration

Mutiny! The Malicious Insider Threat Webinar Registration A Webinar-Video It is often awkward to bring up the one attack vector most of us have not addressed. The malicious insider threat. Even if we can flaunt all statistics and claim that the likelihood of an insider at...

From a Napkin to the Future!

Questions from a decade ago . . . That rhyme! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . So this article starts in my bedroom; cleaning out my closet. I finally decide that yes, I’m will never grow back into th...

What to Expect from an infotex Incident Response Tabletop Test Movie

A Webinar Movie This presentation is intended for those who are planning to participate in an infotex incident response test. Please let us know what questions you have, when we have our Plan Walkthrough and Test Plan Approval meeting!

Data Breach Laws: A State-by-State Framework as of September 2022

What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular posts.  Because laws surrounding the use (and abuse) of technology are always evo...

The Changing IT Landscape and Endpoint Detection and Response (EDR)

Threats are changing, EDR can help us adapt . . . Today’s advanced persistent threat (APT) understands that the IT landscape has changed. In the post-COVID age, more and more organizations have adopted some form of work from home.  While WFH offers many convenience...