Blueberry Security

Blueberry Security

Home
Podcast

Sitemap - 2025 - Blueberry Security

What to Log, Retain, and Monitor Before You Get Breached

What Legal and Insurance Teams Should Expect from a Real DFIR Firm

How to Choose an Incident Response Firm (Even If You’re Not Technical)

DFIR vs MDR: What’s the Difference—and Which One You Actually Need

Why Most Incident Response Vendors Fail—and What Real DFIR Looks Like

What Is DFIR? (Explain Like I’m 12)

How to Tell If You’re Still Compromised After a Security Incident

What to Do After a Phishing Attack Hits One of Your Employees

How to Investigate a Suspicious Login or Endpoint Alert (Without Overreacting or Missing the Breach)

What to Do After a Business Email Compromise (BEC)

How to Respond to a Ransomware Attack (Before It Gets Worse)

My Company Got Hacked—What Do I Do? (Real Incident Response From Blueberry Security)

Blueberry Security SOC & IR Substack

© 2025 Quinnlan Varcoe · Privacy ∙ Terms ∙ Collection notice
Start your SubstackGet the app
Substack is the home for great culture