George FekkasQuick and Dirty CloudTrail Threat Hunting Log AnalysisI needed to do a quick and dirty threat hunting analysis on CloudTrail logs for personal reasons (expand my knowledge on this topic…Jan 25, 2021Jan 25, 2021
George FekkasBreach and Attack Simulation (BAS) TechnologiesBreach and Attack Simulation technologies act as your trusted “adversary” by mimic realistic full cyber attacks cycle based on…Jul 14, 20201Jul 14, 20201
George FekkasMy experience with AWS GuardDuty IDSIndeed, with a few clicks, AWS GaurdDuty was up and running. I had an Intrusion Detection System for my AWS environment. After 15 to 20…Apr 25, 2020Apr 25, 2020
George FekkasHow do I monitor my personal laptop in the age of C19 diseaseRemote work seems to be the new normal. Organizations and people have the obligation to limit contact and person-to-person communications…Apr 7, 2020Apr 7, 2020