peterChatGPT — How to ride the next wave of InnovationRecently, ChatGPT, a type of AI-based code generation model, has gained significant attention. This breakthrough has been met with…Jan 6, 2023Jan 6, 2023
peterHow Does ChatGPT Work? Tracing The Evolution Of AIGC.AIGC, or AI-generated Content, is a way of content creation using artificial intelligence and is considered a new type of content creation…Jan 1, 2023Jan 1, 2023
peterNoiseTotal — The collective intelligence on false positivesPowerShell Encoded command is a common technique used by hackers to avoid detection. By encrypting or encoding commands and other…Jul 6, 2022Jul 6, 2022
peterBlock an external IP address in pfSense automaticallypfSense is a popular open-source Firewall product. Upon detecting suspicious traffics, one of the common remediation to block IP address…Jun 1, 2022Jun 1, 2022
peterThree ways to bridge cloud and on-premises for smooth automationAs more and more security teams are using cloud-based security automation tools like DTonomy, it is not uncommon to see security analysts…Jun 1, 2022Jun 1, 2022
peterContinuous Security Reporting leveraging popular data analytic toolsMicrosoft Power BI and Google Data StudioFeb 9, 2022Feb 9, 2022
peterThe Gap between security detection and responseThe evolution of the Security Operation Center (SOC)Feb 9, 2022Feb 9, 2022