Posts by Cyber Honeyguide
Risk Management
Properly assessing risk through a risk management framework program is a vital part of establishing a security posture and a “must-have” for a company. Risk assessment steps are as follows: Categorize, select, implement, assess, authorize, and monitor are the steps in the NIST framework, and along with risk assessment and analysis, the program helps support…
Read MoreForensic approaches to Network Analysis
Forensic science is the combination of technology, crime investigation methodologies, and establishing facts and interest in bringing light to a criminal investigation. Why forensic investigation? Digital Forensic investigation is about collecting and preserving evidence. The Investigation process includes interviewing, interrogating, collecting, and preserving evidence. It is essential for the evidence to be relevant and handle…
Read More