Subtle Guide to Malware Analysis 1. Introduction to Malware Analysis Malware analysis is the process of determining the functionality, origin, and potential impact of malicious... 11 March 2025 Blog / InfoSec
The Compliance Pitfall: PCI-DSS 3.2.1–4.0 and the Haunted 4.0.1 An email started it all, as all good corporate horror stories do. The subject line proclaimed, “Important Update: PCI-DSS Version... 17 January 2025 Blog / Mumbo Jumbo
An Ironic Horror Tale of CISM, CRISC, and CISA: The Certification Gauntlet Certifications, oh dear. Those are the modern-day requirements for those who wish to establish their value in the field of... 4 January 2025 Blog / Mumbo Jumbo / Tech