Obstracts is the blog feed reader used by the worlds most targetted cyber-security teams. Let me show you why.| dogesec
RSS and ATOM feeds are problematic (for our use-cases) for two reasons; 1) lack of history, 2) contain limited post content. We built some open-source software to fix that.| dogesec
Many attacks are described using free text. This happens, then this, then this. Whereas detection rules provide a structured way to represent these descriptions with actionable content. Attack Flows are the perfect vehicle to combine the two approaches.| dogesec
MITRE ATT&CK techniques are useful, but they don’t capture the sequence of an attack. Enter Attack Flows.| dogesec
A stealthy MaaS infostealer exfiltrating browser, crypto, and system data, Katz Stealer is enabling full campaign control for threat actors.| SentinelOne
The writers and artists in ROOM 2.25 bear witness to what must happen in ourselves, our communities, and our political movements for truth to be faced and change to occur. Some write from amidst genocide, others from their country’s fascist turn, and still others from the impact of environmental catastrophe. Each of these life-threatening events inscribes itself differently on our souls. We live in terrifying times. The post The Writing on the Wall by Hattie Myers appeared first on ROOM A S...| ROOM A Sketchbook for Analytic Action
Intellyx is not your typical IT industry analyst firm. Most analyst firms (including all the large ones) provide research into technology markets, [...]| intellyx.com
Our hub pulls people together in a collaborative space to share problems and solutions around sales tech and first up is CRM adoption.| Vendor Neutral