top of page

CONTENT SERVICES

Creating engaging information security content

We love to create content. We really love to create content that is both engaging and informative about information security (our favorite topic!).

We contributed white-papers, infographics, articles for print and web, blog posts and YouTube videos to multiple customers.

Content can be tailored to various levels of technical ability and to different age groups.

Some examples of our printed works are listed below.

dfd-full-cover.png

DIGITAL FORENSIC DIARIES

Digital forensics is one of the most exciting and challenging areas of the modern day information security field.

The Digital Forensics Diaries allow you to follow a digital forensics investigator through the half scientific, half artistic process that leads to cracking cases without any physical evidence.

Based on the authors real world experiences, the diaries tell fictionalised versions of security incidents and subsequent investigations. A must read for anyone interested in computer security or the digital forensics field.

HANDS-ON INCIDENT RESPONSE AND DIGITAL FORENSICS

Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs.

In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and balance them to meet the needs of an organisation in the event of an information security incident. Best practice tips and real-life examples are included throughout.

61pXp2npjPL.jpg
71A7VuzAOJL.jpg

SECURITY OPERATIONS IN PRACTICE

Security operations departments are growing in importance and recognition; they are responsible for the secure day to day running of an organisation's network, endpoint, application, identity and physical security controls. This book walks you through how to establish and grow a strong security operations team, including hiring the right people, knowing when to build a tool rather than buy, and crafting procedures that allow the team to detect and respond to a wide variety of security threats.

PEN TEST DIARIES

The penetration testing industry has exploded in the last decade, as more and more organisations seek assurance that their cybersecurity strategies are being effectively implemented.


The Pen Test Diaries allow you to follow a penetration tester through the technical, and non-technical processes involved in testing an organisations information security measures.


Based on the author's real world experiences, the diaries tell fictionalised versions of penetration testing discoveries. A must read for anyone interested in computer security or the penetration testing field.

ptd-cover.jpg
btd-book.jpg

BLUE TEAM DIARIES

The Blue Team is charged with defending an organization against an array of technical security threats.


The Blue Team Diaries allow the reader to ride along with the Blue Team at Syntatic, a Seattle-based cloud company, who are charged with keeping millions of customer records safe.


Based on the author's real-world experiences, the diaries tell fictionalised versions of responding to actual security incidents. A must-read for anyone interested in computer security or the incident response field.

Content Services: Projects
bottom of page