Skip to content
Logically Secure Ltd
Menu
  • Testing Services
  • Incident Response
  • Consulting
  • Blog
  • About Us
    • Careers
    • Contact Us
    • Data Handling

Category: Article

Article / Front Page / News

We’re at InfoSecurity 2019

Come see us at InfoSecurity 2019!

Article / Front Page

XFE Mint Linux on a MacBook 2008

So on Easter Sunday I was playing around with an old MacBook from 2008 (5,1) that was running MacOSX El Capitan. I was disappointed that it was no longer supported …

504-wiki / Article / Front Page

Protected: SANS Frankfurt December 2018 links

There is no excerpt because this is a protected post.

504-wiki / Article / Front Page

Protected: SANS London November 2018 links

There is no excerpt because this is a protected post.

Article / Front Page

SANS@Night London Talk by Steve Armstrong

Thank you for coming to the talk on Tuesday night

Article / Front Page / News

SANS@Night Berlin Talk

Here are my slides from the SANS@Night talk in Berlin on 24th July.

Article / Front Page

Good Luck Steelcon!

Just a note to say good luck to the organisers of Steelcon.

Article / Front Page / News

IR Metrics – Initial Investigation

This is part 2 of the series on improving your IR metrics. Here we look at the Initial Investigation to see how we can improve the IR Staff’ response times.

Article / Front Page / News

IR Metrics – how do you know if you’re getting better?

One of the problems with measuring Incident Response is that many of the commonly used metrics are not actually related to the performance or efficiently of the IT/Security staff. Issues …

Article / Front Page / Information Security

Getting past “Just Compliance”

I have been a cyber security practitioner for over 20 years and over the last 10 years I have also been fortunate enough to have taught or presented to, on …

Posts navigation

Newer posts

Recent Posts

  • 9 Basic Steps to help check an email isn’t Phishing
  • 5 key security factors to working from home more safely
  • 11 Common Cyber-attack Methods
  • 10 fundamental steps of cyber security
  • The Importance of Two-Factor Authentication (2FA)
Copyright © 2023 Logically Secure Ltd