The most potent tool for threat hunting and incident response arguably can't easily be entirely captured into code or automated away into a playbook or security orchestration, automation, and response (SOAR) platform. This is not to diminish the fantastic progress of the artificial intelligence research community since 1956 or rule out the role Skynet could … Continue reading Overcoming Cognitive Biases During Threat Hunts and Incident Response
Category: Uncategorized
Securing Linux Full Disk Encryption with A Multi-Factor Hardware Token
Linux Unified Key Setup (LUKS) is a powerful disk encryption specification that pairs with the Logical Volume Manager (LVM) to provide full disk encryption on most modern versions of Linux. LUKS based encryption can be secured even further with the addition of a hardware-based two-factor authentication device. This post will cover how to associate Yubico's … Continue reading Securing Linux Full Disk Encryption with A Multi-Factor Hardware Token