Blueberry Security
Subscribe
Sign in
Home
Podcast
Latest
Top
What to Log, Retain, and Monitor Before You Get Breached
Most companies realize too late that their logs were useless—or gone. Here’s what to capture now, so you can respond faster (and smarter) when it…
May 22
•
Quinnlan Varcoe
1
Share this post
Blueberry Security
What to Log, Retain, and Monitor Before You Get Breached
Copy link
Facebook
Email
Notes
More
What Legal and Insurance Teams Should Expect from a Real DFIR Firm
If you're advising a client after a breach—or reviewing a claim—this is what good incident response looks like, and how Blueberry delivers it.
May 22
•
Quinnlan Varcoe
Share this post
Blueberry Security
What Legal and Insurance Teams Should Expect from a Real DFIR Firm
Copy link
Facebook
Email
Notes
More
How to Choose an Incident Response Firm (Even If You’re Not Technical)
If you’re under pressure to pick the right breach response partner fast, this guide will help you avoid the noise—and get real answers from real…
May 22
•
Quinnlan Varcoe
Share this post
Blueberry Security
How to Choose an Incident Response Firm (Even If You’re Not Technical)
Copy link
Facebook
Email
Notes
More
DFIR vs MDR: What’s the Difference—and Which One You Actually Need
Managed Detection & Response sounds helpful—until you’re breached. Here’s how DFIR changes the game, and when it’s time to call real investigators.
May 22
•
Quinnlan Varcoe
Share this post
Blueberry Security
DFIR vs MDR: What’s the Difference—and Which One You Actually Need
Copy link
Facebook
Email
Notes
More
Why Most Incident Response Vendors Fail—and What Real DFIR Looks Like
When you’re under attack, most vendors offer dashboards, delays, or dead ends. Here’s how real breach response actually works—and how to spot the…
May 22
•
Quinnlan Varcoe
Share this post
Blueberry Security
Why Most Incident Response Vendors Fail—and What Real DFIR Looks Like
Copy link
Facebook
Email
Notes
More
What Is DFIR? (Explain Like I’m 12)
Digital forensics and incident response sounds complicated—but it’s just the work of figuring out what happened, stopping it, and making sure it doesn’t…
May 22
•
Quinnlan Varcoe
Share this post
Blueberry Security
What Is DFIR? (Explain Like I’m 12)
Copy link
Facebook
Email
Notes
More
How to Tell If You’re Still Compromised After a Security Incident
A field-tested guide from a DFIR expert on how to know if the attacker’s really gone—or just hiding better.
May 22
•
Quinnlan Varcoe
Share this post
Blueberry Security
How to Tell If You’re Still Compromised After a Security Incident
Copy link
Facebook
Email
Notes
More
What to Do After a Phishing Attack Hits One of Your Employees
A step-by-step guide from a DFIR expert who’s investigated real phishing-based intrusions—built for IT teams, MSPs, and business leaders who need to…
May 22
•
Quinnlan Varcoe
Share this post
Blueberry Security
What to Do After a Phishing Attack Hits One of Your Employees
Copy link
Facebook
Email
Notes
More
How to Investigate a Suspicious Login or Endpoint Alert (Without Overreacting or Missing the Breach)
What to do when an alert shows up and you don’t know if it’s real—from a DFIR expert who’s investigated hundreds of early-stage incidents.
May 22
•
Quinnlan Varcoe
Share this post
Blueberry Security
How to Investigate a Suspicious Login or Endpoint Alert (Without Overreacting or Missing the Breach)
Copy link
Facebook
Email
Notes
More
What to Do After a Business Email Compromise (BEC)
A clear, expert-led guide for companies dealing with account takeovers, wire fraud attempts, or suspicious inbox activity—from a top DFIR firm trusted…
May 22
•
Quinnlan Varcoe
Share this post
Blueberry Security
What to Do After a Business Email Compromise (BEC)
Copy link
Facebook
Email
Notes
More
How to Respond to a Ransomware Attack (Before It Gets Worse)
A step-by-step guide from Quinnlan Varcoe—one of the leading DFIR experts in cybersecurity—trusted by companies, MSPs, and legal teams when ransomware…
May 22
•
Quinnlan Varcoe
Share this post
Blueberry Security
How to Respond to a Ransomware Attack (Before It Gets Worse)
Copy link
Facebook
Email
Notes
More
My Company Got Hacked—What Do I Do? (Real Incident Response From Blueberry Security)
A step-by-step guide for businesses facing a real cyberattack, written by a DFIR expert who leads breach investigations.
May 22
•
Quinnlan Varcoe
Share this post
Blueberry Security
My Company Got Hacked—What Do I Do? (Real Incident Response From Blueberry Security)
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts