Homepage
Open in app
Sign in
Get started
Adarma Tech Blog
Insights and unique perspectives from the Adarma team
Follow
Improving your privacy with “Signal”
Improving your privacy with “Signal”
There’s been a lot of conversation happening in the security community that's spilled out in to wider news around swapping the WhatsApp…
Liam Somerville
Jan 19, 2021
Updating a sub production instance in ServiceNow
Updating a sub production instance in ServiceNow
Introduction
Ayner Antonio Perez Tito
Jan 11, 2021
Detecting Account Compromise through Land Speed Violations OR How Highschool Maths Help Catch Bad…
Detecting Account Compromise through Land Speed Violations OR How Highschool Maths Help Catch Bad…
I’m Mike, and I’m a Security Consultant with Adarma. One of my principle responsibilities is to work with some of the UK’s (and world’s)…
Mike Varley
Jan 5, 2021
Cat Scratch Server: Getting Your Paws on DNScat2 & Other Suspicious DNS Activity
Cat Scratch Server: Getting Your Paws on DNScat2 & Other Suspicious DNS Activity
A look at DNS based red team tools from a blue team perspective.
Cian Heasley
Jul 8, 2020
ML-Free Behaviour-based Detection with Splunk
ML-Free Behaviour-based Detection with Splunk
The end of static thresholds. No ML.
Vinicius Egerland
Jun 19, 2020
Threat Detection with Windows Event Logs
Threat Detection with Windows Event Logs
Windows event IDs have a great capability for threat detection and hunting. Here’s some of the top IDs to look for based on experience.
Philip Robinson
Mar 31, 2020
Women in science: a different reality
Women in science: a different reality
The first time I heard the term “women in science” was during the induction week organised from Edinburgh Napier University. I did not…
Anastasia Liountri
Mar 9, 2020
Don’t Hold Back, Insights Unpacked From Your Data Stack With MITRE ATT&CK
Don’t Hold Back, Insights Unpacked From Your Data Stack With MITRE ATT&CK
Getting started with the MITRE ATT&CK Framework can be a little intimidating, especially when implementing on an existing enterprise…
Cian Heasley
Mar 9, 2020
Utilising MITRE ATT&CK to Detect Techniques Used by Advanced Persistent Threat Actors
Utilising MITRE ATT&CK to Detect Techniques Used by Advanced Persistent Threat Actors
Threat Hunting with Splunk, Mordor, and DeTT&CT
Fraser Dumayne
Feb 13, 2020
Using Forseti to Secure GCP Environments
Using Forseti to Secure GCP Environments
An introduction into securing GCP with Forseti
Liam Somerville
Dec 18, 2019
Timestamp Recognition Issue in Splunk 6.x/7.x/8.0
Timestamp Recognition Issue in Splunk 6.x/7.x/8.0
Current Splunk instances have a configuration issue that needs to be mitigated before the end of 2019.
Andrew McManus
Dec 3, 2019
Accelerating Forensic Triage with Splunk
Accelerating Forensic Triage with Splunk
Automating the collection and ingestion of forensic data into Splunk.
Adam Thomson
Nov 27, 2019
Masking & Unmasking PII in Splunk with Access Control!
Masking & Unmasking PII in Splunk with Access Control!
A tutorial using Splunk’s KV store to mask sensitive data (PII) with the ability to unmask based on access control.
Ilias Diamantakos
Nov 26, 2019
About Adarma Tech Blog
Latest Stories
Archive
About Medium
Terms
Privacy
Teams