Published inOSINT TeamUnderstanding the Full Spectrum of Threat IndicatorsIf you’ve spent more than a day in cybersecurity, you’ve definitely heard the phrase Indicators of Compromise, or IOCs, thrown around.Sep 24Sep 24
Cloud Security Fundamentals: IAM, RBAC, PoLP, and more…We’re no longer “moving toward” the cloud. We’re already here.Sep 3Sep 3
Published inOSINT TeamHow to Actually Leverage the MITRE ATT&CK Framework in Security OperationsThe MITRE ATT&CK Framework is one of the most recognized and most referenced knowledge bases in the blue team community. And for good…Aug 13Aug 13
Published inOSINT TeamThe Playbook for PlaybooksNo, they’re not the flashiest part of Security Engineering. But if you want a scalable, world-class Security Operations function, they’re…Jul 27Jul 27
Tuning Detections isn’t Hard Unless You Make it HardDetection Engineering is an underappreciated role in cybersecurity.Jul 24A response icon1Jul 24A response icon1
Published inOSINT TeamSecurity Engineer Starter Guide: Security OperationsIf you’re looking to break into the blue team side of cybersecurity…Jul 11Jul 11
Published inOSINT Team5 Lessons Learned as Incident Commander of the Biggest Security Incident of My CareerI’ve been working in Detection and Incident Response for over half a decade now.Jun 18A response icon2Jun 18A response icon2
Published inOSINT TeamMy Log Source-Agnostic Methodology to Understanding Big DataAfter writing about my SIEM-Agnostic Approach to Detection Engineering, I realized I had to skip over a critical piece to stay on topic.Jun 5A response icon1Jun 5A response icon1
Published inOSINT TeamCyber Chat: Page GlavePivoting careers. Panther + Scanner is the optimal stack. Day-to-day as a Detection Engineer. And more…May 21May 21
Published inOSINT TeamEmail Security: The Basics of Protecting Your Organization & YourselfEmail has been around for forever. Its invention is often credited to Ray Tomlinson, who in 1971 sent the first message using the…May 15May 15