Research & Insights

Academy Blog

Cybersecurity research, threat analysis, intelligence insights, and strategic education from our analyst team.

136 articles
2. Sandbox Evasion Techniques CS20 - Advanced Malware Analysis, Reverse Engineering & Countermeasures

2. Sandbox Evasion Techniques

Read Article
1. Static & Dynamic Malware Analysis CS20 - Advanced Malware Analysis, Reverse Engineering & Countermeasures

1. Static & Dynamic Malware Analysis

Read Article
5. Chain of Custody & Legal Considerations CS19 - Incident Response, Forensic Analysis & Investigation Techniques

5. Chain of Custody & Legal Considerations

Read Article
4. Log Correlation & Timeline Analysis CS19 - Incident Response, Forensic Analysis & Investigation Techniques

4. Log Correlation & Timeline Analysis

Read Article
3. Disk Forensics (The Sleuth Kit & Autopsy) CS19 - Incident Response, Forensic Analysis & Investigation Techniques

3. Disk Forensics (The Sleuth Kit & Autopsy)

Read Article
2. Memory Forensics (Volatility) CS19 - Incident Response, Forensic Analysis & Investigation Techniques

2. Memory Forensics (Volatility)

Read Article
1. IR lifecycle (NIST 800-61) CS19 - Incident Response, Forensic Analysis & Investigation Techniques

1. IR lifecycle (NIST 800-61)

Read Article
4. Security Metrics & Key Performance Indicators (KPIs) CS18 - Cyber Risk Management & Quantitative Assessment

4. Security Metrics & Key Performance Indicators (KPIs)

Read Article
3. Threat modeling (STRIDE, PASTA, LINDDUN) CS18 - Cyber Risk Management & Quantitative Assessment

3. Threat modeling (STRIDE, PASTA, LINDDUN)

Read Article
2. Probabilistic Risk Modeling CS18 - Cyber Risk Management & Quantitative Assessment

2. Probabilistic Risk Modeling

Read Article
1. Risk Frameworks: ISO 27005, FAIR CS18 - Cyber Risk Management & Quantitative Assessment

1. Risk Frameworks: ISO 27005, FAIR

Read Article
5. Continuity Simulations CS17 - Business Continuity Planning & Cyber Resilience Engineering

5. Continuity Simulations

Read Article