by Charles Herring | Sep 11, 2017 | blog, InfoSec Craft, Inside WitFoo
Playbook Automation in Incident Response An emerging concept in 2017 is “Playbook Automation.” What is Playbook Automation? Playbook automation collects data from different security and logging tools and makes decisions on behalf of the incident responder. Data...
by Charles Herring | Sep 7, 2017 | blog, InfoSec Craft, Inside WitFoo
Cognition vs Artificial Intelligence Computer scientists love the idea of artificial intelligence (AI). It is the centerpiece of many mainstream science fiction works. It’s also a preferred buzzword of lazy vendors and marketers. Until computers can convince (trick) a...
by Charles Herring | Sep 5, 2017 | blog, InfoSec Craft, Inside WitFoo, Uncategorized
Algorithms & Machine Learning Demystified When I was learning how to troubleshoot and repair electronics in the Navy, I would sometimes challenge one of the instructors on how something worked. If I delved into a complicated subject I was often told it worked on...
by Charles Herring | Aug 14, 2017 | blog, InfoSec Craft, Inside WitFoo, Uncategorized
Rise of the Machines Cybersecurity Incident Response has only been a part of human history for a couple of decades. Over the short course of time, industry leaders, analysts and vendors have put a heavy focus on the importance of technology solving problems within the...
by Reese Zomar | Jun 26, 2017 | blog, InfoSec Craft, Inside WitFoo, WitFoo Story
I’ll begin with some background on a diverse career. I was commissioned as an Ensign in the US Navy in May of 1991 with a designation to become a Naval Aviator. Navy flight school has a student pipeline with the characteristics of a slinky. I happened to enter...
by Keith Wilson | May 17, 2017 | blog, InfoSec Business, InfoSec Craft, Inside WitFoo, WitFoo Story
There is a cyber poverty mark that plagues the Cyber Security Industry. The global 2000 and the federal government have budgets that allow them to build strong defenses, hire large teams, and perform full and complete investigations. In this talk, we discuss what can...