We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

6 Results for: "Joff Thyer"

 


September 5, 2018 | Penetration Testing and Red Teaming
By Joff Thyer, IANS Faculty

 Harness the Power of Purple Teaming

The collaborative power of purple teaming is tough to beat, but what's the best way to get started? In this report, IANS Faculty Joff Thyer details the requisite roles, responsibilities, tools and technologies for conducting effective purple team exercises.

Read More »


February 28, 2018 | Malware and Advanced Threats
By Joff Thyer, IANS Faculty

 Detect and Defend Against Fileless Malware

Never mind zero days. Fileless malware – which uses Windows tools like PowerShell and WMI to establish command-and-control channels and otherwise wreak havoc – is taking off in a big way. In this report, IANS Faculty Joff Thyer explains how fileless malware works, why it's becoming more rampant and the key steps to take to detect and defend against it.

Read More »


August 11, 2017 | Threat Detection and Hunt Teaming
By Joff Thyer, IANS Faculty

 Detect Attackers Pivoting in the Network

We all know attackers are likely already on our networks, but what are the best ways to flush them out as they pivot and try to exfiltrate critical data? In this Ask-an-Expert live interaction, IANS Faculty Joff Thyer details several key pivot detection strategies, including monitoring for specific processes and behavior on endpoints, and establishing honey tokens.

Read More »


May 12, 2017 | Malware and Advanced Threats
By Joff Thyer, IANS Faculty

 Blocking Adware to Reduce Risk and Improve Browser Performance

Adware is more than a nuisance; it's often a clever delivery mechanism for spyware and malware. How can organizations block it effectively without impacting the business? In this Ask-an-Expert written response, IANS Faculty Joff Thyer explains how adware works and recommends taking a multi-layered approach to mitigating the risk.

Read More »


February 18, 2016 | Threat Detection and Hunt Teaming
By Joff Thyer, IANS Faculty

 How to Think Like an Attacker

With attackers continuing to find highly targeted ways to bypass defenses, security organizations are under more pressure than ever to "defend the castle." In this report, IANS Faculty Joff Thyer offers a number of steps for security teams to out-think potential attackers, from performing internal reconnaissance to educating users about the potential virtual threats they may encounter.

Read More »