Author: W. Curtis Preston

  • Author: W. Curtis Preston

Visualization Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Visualization tools transform security data into dashboards, graphs, and metrics that make it easier to monitor systems

Read More

Internet Search & Discovery Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Specialized search engines for discovering Internet-connected devices, exposed services, and potential security vulnerabilities across the public Internet.

Read More

Payment Processing Tools (for business continuity)

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Payment processing platforms that enable businesses to continue accepting payments during system outages or recovery operations.

Read More

Anonymity/Privacy Tools (Use with Caution)

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Tools that enable anonymous browsing, primarily used for safely researching dark web ransomware sites and threat actor

Read More

Bootable Media Creation Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Utilities for creating bootable USB drives and media, essential for forensic investigations and system recovery operations.

Read More

Compliance & Configuration Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Tools for managing compliance requirements, auditing cloud events, and maintaining configuration controls in enterprise environments. Microsoft 365

Read More

Development Libraries (Free – for scripting/automation)

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! JavaScript libraries commonly used in development and automation tasks that may be referenced in scripts or tools

Read More

Threat Intelligence & Dark Web Monitoring Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Threat intelligence platforms provide real-time information about emerging threats, track ransomware groups, monitor the dark web for

Read More

DNS & Web Security Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! DNS and web security tools filter malicious domains, block threats at the DNS level, and protect users

Read More

Vulnerability Scanning & Network Analysis Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! These tools scan networks and systems for security vulnerabilities, analyze network traffic, and detect potential security issues

Read More