Author: W. Curtis Preston

  • Author: W. Curtis Preston

On-Premises Object Storage with Immutability

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! On-premises object storage platforms that provide S3-compatible storage with immutability and WORM (Write Once Read Many) capabilities

Read More

Cloud Storage with Immutability

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Cloud object storage services that support immutability features to protect backup data from ransomware by preventing deletion

Read More

Cloud Platform Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Cloud platform tools provide logging, monitoring, threat detection, and security analytics capabilities specific to major cloud service

Read More

Ransomware Identification & Analysis Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! These tools help identify ransomware variants, analyze malware behavior in safe environments, and locate available decryption tools

Read More

Disk Management & Wiping Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! These tools manage disk partitions, securely wipe data, repair boot records, and recover files from damaged or

Read More

Specialized Analysis Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! These specialized tools provide focused capabilities for specific analysis tasks like log parsing, pattern matching, and timeline

Read More

Forensic Imaging & Analysis Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Forensic tools enable investigators to create bit-for-bit copies of storage media and analyze digital evidence while maintaining

Read More

Data Collection Streaming Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! These tools enable efficient collection, processing, and streaming of log data from multiple sources to SIEM platforms

Read More

SIEM Platforms

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! Security Information and Event Management (SIEM) platforms collect, correlate, and analyze security logs and events from across

Read More

Endpoint Management, Security & Detection Tools

These are tools discussed Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse the list of all tools or get the book. Inclusion in this directory does not indicate endorsement.If you see a missing tool, leave a comment! These tools provide endpoint protection, detection, and management capabilities to monitor, secure, and respond to threats on

Read More