Playbook Battle Card: GSPBC-1019 – Persistence – BITS Jobs

Playbook Battle Cards are part of GuardSight’s choreographed routines protecting our customers. Windows Background Intelligent Transfer Service (BITS) is a file transfer implement. Cyber attackers often abuse BITS jobs to execute malign objectives.  Aggressors may abuse BITS to download and execute malicious code, and because BITS tasks are self-contained, Host firewalls typically permit the activity…. Read More

Incident Response: Dwell Time

Correlation Between Preparation, Dwell Time, and Cost Dwell Time Defined Dwell time, in the context of cybersecurity, is a measurement used to convey the duration that a threat actor enjoys going undetected within a network ecosystem until their termination and full eradication. Evaluation of data from incident response engagements, caused by successful asset compromise due… Read More

CCPA: Chapter 2 – Business Challenges, Obligations, & Penalties

California Consumer Privacy Act of 2018 (“CCPA”) Business Challenges: Privacy Compliance & Data Security Conservative estimates indicate that California’s new data privacy law, CCPA, impacts as many as 500,000 or more businesses across the United States. While many consumer-privacy advocates herald CCPA as another good step toward maturing organization use and protection of personally identifiable… Read More

CCPA: Chapter 1 – Introduction

California Consumer Privacy Act of 2018 (“CCPA”) CCPA Is The Law Effective January 1, 2020, California’s Consumer Privacy Act (“CCPA”) represents a significant change in data privacy rights for California consumers. CCPA also spells out several legal obligations for specific businesses that collect, store, sell, or share personal information about California consumers. Key Points For… Read More