Search for: "APT IP Holdings, LLC" Results 1 - 2 of 2
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
20 Oct 2020, 2:22 pm by Kevin LaCroix
Evidence gleaned from a cyber-attack can rest among disparate logs (if they even exist), volatile memory captures, server images, system registry entries, spoofed IP addresses, snarled network traffic, haphazard and uncorrelated timestamps, Internet addresses, computer tags, malicious file names, system registry data, user account names, network protocols and a range of other suspicious activity. [read post]
6 Aug 2015, 6:21 pm by Kevin LaCroix
John Reed Stark is President of John Reed Stark Consulting LLC, a data breach response and digital compliance firm. [read post]