Blue Core Research
Contact Us

Author: Guadalupe Boll

  • Reactive Forensics and Auditing: Follow Sherlock Holmes

    Reactive Forensics and Auditing: Follow Sherlock Holmes

    A reactive forensic investigation is the IT equivalent of a detective analyzing a crime scene. Just as Sherlock Holmes reconstructed the events of a crime through clues, traces, and deductive methods, reactive forensics seeks to answer essential questions like who did it, when, how, etc.? Basically – what happened? Evidence Collection Holmes analyzes every detail…

  • What is the Difference Between Auditing and Monitoring?

    What is the Difference Between Auditing and Monitoring?

    When people hear auditing and monitoring, they can easily assume they refer to the same thing. After all, both involve keeping an eye on IT systems, right? While both terms have multiple meanings, without qualifiers, they relate to functions that serve different purposes and leverage unrelated tools and technologies. Understanding these differences is fundamental to…

  • Budgeting for a Secured Future

    Budgeting for a Secured Future

    Cybersecurity Underinvestment Data breaches are at an all-time high. Different studies show different figures about which countries are most under attack, but it’s pretty obvious that nowhere is safe. It seems as though the whole world is under attack and there are many successful data breaches. At the same time, investment in cybersecurity is insufficient…

  • From a hacker’s perspective

    From a hacker’s perspective

    Attack Detail & Analysis Below we’ll explain the types of attacks used in the comics, provide statistics about their prevalence, and discuss possible defensive measures. This attack and successful breach required a combination of several steps. That’s how all breaches are. While it may not be possible to stop them all the steps, you should…

  • Email Security: Effectiveness & Risks

    Email Security: Effectiveness & Risks

    What Happened? Hackers found an exploit in organizations that use Office 365 and Proofpoint. The exploit allowed the hackers to send authenticated emails with digital signatures identical to emails sent by those organizations. The list of exploited organizations includes Disney, Coca-Cola, IBM, Nike, Best Buy, and many others. Using this exploit, hackers sent over at…

  • Perimeter Vs. Data-Centric Guide

    Perimeter Vs. Data-Centric Guide

    Download Guide VIDEOS

  • Potential risks in endpoint security

    Potential risks in endpoint security

    What Happened As we’ve seen, a bug in a CrowdStrike update caused worldwide havoc. Approximately 8 million Windows computers crashed at many companies, from airlines to broadcast news to hospitals. Desperate users took to forums, some entire organizations ground to a halt, and some problems persisted for days and longer. While CrowdStrike was able to…