GIAC Research Papers
Explore GIAC research papers authored by certified professionals, covering real-world cybersecurity topics including cloud security, incident response, digital forensics, and AI.
Are your Azure Applications at Risk?
Research PaperAzure Cloud by Microsoft is one of the most popular choices of cloud service provider. Azure...
- 29 Sep 2022
Threat Intelligence-Driven Attack Surface Management
Research PaperDigital Forensics and Incident ResponseDefenders struggle to keep up with the pace of digital transformation in the face of an expanding...
- 9 Aug 2022
Secure Email Transmission Protocols — A New Architecture Design
Research PaperDuring today’s digital age, emails have become a crucial part of communications for both personal...
- 9 Aug 2022
How to Build and Use an Incident Response Playbook Effectively
Research PaperDigital Forensics and Incident ResponseAn effective incident response playbook provides structure and clarity during high-pressure security events.
- 25 Jul 2022
Enter The Matrix: Automating Secure Communication Infrastructure at the Organizational Level
Research PaperThe Matrix project details a set of open APIs for decentralized and federated communication across...
- 25 Jul 2022
Windows 10 vs. Windows 11, What Has Changed?
Research PaperDigital Forensics and Incident ResponseWindows 10 was released on July 29, 2015. It has since become the most installed desktop operating...
- 25 Jul 2022
Triaging Windows Event Logs for Ransomware Investigations
Research PaperRansomware attacks on organizations will disrupt their day-to-day operations causing significant...
- 27 Jun 2022
Malware Function-based encryption technique
Research PaperCyber Defense, Digital Forensics and Incident ResponseRecent malware often uses techniques to evade detection by cybersecurity products. One of the...
- 22 Jun 2022
Detecting Unauthorized Behavior From Legitimate Accounts
Research PaperCyber Defense, Digital Forensics and Incident ResponseIncident Responders face an almost insurmountable amount of log events, and the move to the Cloud...
- 22 Jun 2022
Recover an RSA Private Key from a TLS v1.2 session
Research PaperCyber Defense, Cybersecurity and IT EssentialsCyberattacks happen every day.Most organizations have administrative and technical controls...
- 22 Jun 2022
Metrics-driven information security framework as part of information security management
Research PaperAs part of any Information Security Management System, measuring and reporting information security...
- 22 Mar 2022
Adversary Emulation: Nefilim Ransomware vs. Security Onion
Research PaperAny self-respecting present-day modern organization seeks cost-effective technology or tools that...
- 16 Mar 2022
