Shawn Edward

Shawn Edward

SIEM_Detection_Engineering

64 stories

Shawn Edward

Shawn Edward

Malware

23 stories

Shawn Edward

Shawn Edward

Threat Hunting

63 stories

Crown Jewel Analysis
Shawn Edward

Shawn Edward

Azure_M365

51 stories

Shawn Edward

Shawn Edward

AWS

279 stories

Shawn Edward

Shawn Edward

Bug Bounty

13 stories

Shawn Edward

Shawn Edward

Frameworks

32 stories

Analysis of Competing Hypotheses
Shawn Edward

Shawn Edward

Active_Directory

6 stories

Shawn Edward

Shawn Edward

OSINT

10 stories

Shawn Edward

Shawn Edward

Red_Team

9 stories

Shawn Edward

Shawn Edward

Linux

2 stories

Shawn Edward

Shawn Edward

Disinformation

1 story

Shawn Edward

Shawn Edward

Memory Forensics

2 stories

Shawn Edward

Shawn Edward

Cybersecurity Policy

1 story

an AI-generated star
Shawn Edward

Shawn Edward

Vulnerability_Threat_Management

1 story

Shawn Edward

Shawn Edward

Web App Security Testing

1 story

Shawn Edward

Shawn Edward

Tabletops

1 story

Shawn Edward

Shawn Edward

Code Review

2 stories

Shawn Edward

Shawn Edward

Zero_Trust

1 story

Shawn Edward

Shawn Edward

OSINT

6 stories