Shaun VlassisThreat Detection Bounty ProgramsWhat is a Threat Detection Bounty Program (TDBP)?Jan 18Jan 18
Shaun VlassisPrioritising your threat detection capabilitiesPrioritising your threat detection capability is essential to ensure that your organisation effectively allocates resources and focuses on…Dec 14, 2023Dec 14, 2023
Shaun VlassisRevolutionising Cyber Threat Detection with the power of the crowdIn the ever-evolving landscape of cybersecurity, organisations face an uphill battle in implementing effective threat detection…Nov 21, 2023Nov 21, 2023
Shaun Vlassis2023 ASD Cyber Threat Report, Detection where art thou?The ASD’s annual threat report, available for perusal here, is a treasure trove of information. Yet, a subtle concern emerges upon closer…Nov 15, 2023Nov 15, 2023
Shaun VlassisThe importance of reference data for effective threat detectionReference data, also known as Enrichment data, is a crucial component of enabling accurate threat detection rules.Nov 6, 2023Nov 6, 2023
Shaun VlassisThe Unsung Heroes of Security Operations: Navigating the Complex Technology and Organisational…The backbone of security operation teamsOct 31, 20231Oct 31, 20231
Shaun VlassisUnderstanding Burnout in Security Operations Center StaffIn the cybersecurity realm, burnout is a prevalent issue affecting Security Operations Center (SOC) analysts, detection engineers, threat…Oct 25, 2023Oct 25, 2023