PinnedMatthewDeynMITRE ATT&CK ResearchIf you work in Cybersecurity you likely know of the MITRE ATT&CK framework which has now been going for 10 years since 2013.Dec 14, 2023Dec 14, 2023
MatthewDeynUnderstanding and Configuring Network Connections for a SOC LabWhen delving deeper into a Virtual Machine’s settings, you’ll find that there are many different options for modification, depending on…Jul 1Jul 1
MatthewDeynExploring the ‘dig’ utilityI recently started studying for BTL1 courtesy of Security Blue Team and thought it’d be good to delve deeper into various topics and…Jun 19Jun 19
MatthewDeynGetting Started with Falco & Runtime Detection on WindowsFor those new to the Cybersecurity Analyst world, getting started with some kind of detection tool is an invaluable and essential process…Dec 13, 2023Dec 13, 2023
MatthewDeynVulnerability Identification ft. NmapEffective vulnerability management is essential in maintaining the security posture of an organization. It helps prevent security breaches…Nov 17, 2023Nov 17, 2023
MatthewDeynWhat is Reconnaissance in Cybersecurity?When it comes to reconnaissance, there is no other concept in cybersecurity that is as foundational when it comes to understanding and…Nov 8, 2023Nov 8, 2023
MatthewDeynWhat is a Security Posture Assessment? (SPA)While posture at work is important no matter the role, in Cybersecurity, there is another important type of posture assessment we need to…Oct 30, 2023Oct 30, 2023
MatthewDeynHello and welcomeHello welcome to my Cybersecurity blog. In 2022 I completed a 1000 hour internship with CyberPro. It was a rewarding experience with…Sep 20, 2023Sep 20, 2023