top of page
Search
Drew Hjelm
Mar 20, 20242 min read
Threat Alert! How to Check and Secure your Google, Microsoft, and Apple Accounts
Have you ever felt that unsettling moment when you suspect your online accounts have been breached? Perhaps you received a mysterious...
80 views0 comments
Drew Hjelm
Dec 20, 20225 min read
Can Artificial Intelligence build your information security program? Probably not (yet!)
One of the most widely discussed tools to be released recently is the ChatGPT released by OpenAI, an artificial intelligence chat bot...
73 views0 comments
Drew Hjelm
Oct 20, 20221 min read
You’ve got Mail (and Misdirected Funds): A live demo of email hacking
Presentation given at CypherCon, March 31, 2023 In 2022, email compromises were one the costliest forms of cybercrime reported to the...
190 views0 comments
Drew Hjelm
Aug 17, 20221 min read
Easy Playbooks to Make Ransomware Criminals Cry
Here are the slides and playbooks discussed in the BlueTeamCon presentation, "Easy Playbooks to Make Ransomware Criminals Cry" on August...
987 views0 comments
Drew Hjelm
Aug 15, 20224 min read
What Can Van Halen Teach Us About Cyber Insurance?
The dawn of music on television led to the rise of big bands with big personalities in the 1980s. One of the biggest acts of that era was...
84 views0 comments
Drew Hjelm
Aug 9, 20225 min read
Your Free Email Might Be Pretty Expensive in a Data Breach
With many free email providers you get what you pay for in terms of logging data that can be used if the bad guys get access.
77 views0 comments
Drew Hjelm
Jun 13, 20224 min read
What’s the Word? Common Incident Response Lingo to Know
Folks who work in the technology and cybersecurity industry often use specialized language and lingo to talk about their jobs. For those...
51 views0 comments
Drew Hjelm
May 24, 20222 min read
Secure Yourself Online: Use Anonymized Email Addresses
It seems like everywhere you go there’s a new requirement to give out your email address for contact information. Many of those places...
63 views0 comments
Drew Hjelm
May 10, 20223 min read
One Weird Trick: Blocking Password-Protected Attachments to Combat Ransomware
Threat actors deploying ransomware typically gain access to victims’ networks through either phishing emails that get them access to a...
147 views0 comments
bottom of page