October 4, 2019October 4, 2019Technical Articles Attackers Inside the Walls: Detecting Malicious Activity Small and medium-sized businesses (SMBs) do not always have the budget for […]
October 4, 2019October 4, 2019Technical Articles Security Primer – IcedID IcedID, also known as BokBot, is a modular banking trojan that targets […]
October 4, 2019October 4, 2019Technical Articles Security Primer – Ransomware Throughout 2019, state, local, tribal, and territorial (SLTT) government entities are increasingly […]
October 4, 2019October 4, 2019Technical Articles Security Primer – TrickBot TrickBot is a modular banking trojan that targets sensitive information and acts […]
October 3, 2019October 4, 2019Technical Articles BowTie – A deep learning feedforward neural network for sentiment analysis How to model and encode the semantics of human-written text and select […]
October 2, 2019October 4, 2019Technical Articles Internet of Things (IoT) Trust Concerns (Draft Document) This draft white paper identifies seventeen technical trust-related issues that may negatively […]
September 14, 2018September 28, 2018Cybersecurity Resources, Malware What Is Malware? Malware, or “malicious software,” is a catch all term for software code […]