Mag1cM0nAzure Sentinel — Investigation PreviewAzure Sentinel was on my watch list since few months and I was expecting the release of the “investigation” feature with impatience. This…Jun 28, 2019Jun 28, 2019
Mag1cM0nSecurity Monitoring: The pyramid of joy for People! (2/4)In the introduction blog post, I have presented the general methodology that I applied to create a security monitoring practice. I…Jan 7, 2019Jan 7, 2019
Mag1cM0nSecurity Monitoring: The pyramid of joy! (1/4)I have been working for so-called big companies since the very beginning of my IT Security career. One year ago, I started a new position…Dec 7, 2018Dec 7, 2018
Mag1cM0n5 questions you should ask your Security Monitoring service provider (MSSP)Going for an outsourced security monitoring service is often perceived as the ultimate assurance that all problems will be spotted or at…Jul 30, 2018Jul 30, 2018
Mag1cM0n5 Evidences That You Are Successful at THREAT INTELLIGENCEI have been around Threat Intelligence for 5 years now and I would like to share the experience gained in this domain by listing the top 5…Jul 20, 2018Jul 20, 2018
Mag1cM0nWhat to expect from Automated Risk-Based Scores“Why didn’t you treat that alarm first as it has a higher risk score?” We freshly hired Dimitri few weeks ago and he was still shadowing…Jul 10, 2018Jul 10, 2018
Mag1cM0nActive CyberDefense: Installing Artillery on Windows Server 2012 R2I had the chance to be trained by Bryce Galbraith before my GCIH certification. This course basically opened my eyes on what my job as a…Jul 5, 2018Jul 5, 2018