Homepage
Open in app
Sign in
Get started
Cyberdnevnik
Journaling through Cyberspace
Follow
Unlock the Power of Proactive Security: Why You Need Microsoft Sentinel
Unlock the Power of Proactive Security: Why You Need Microsoft Sentinel
If you have different data sources coming in from various types of machines, firewalls, log forwarders, network security groups, etc…
Vedran Brodar
May 17
Proper client communication – storytelling
Proper client communication – storytelling
How to get the job done while nurturing healthy and positive relationship with the client — my experience.
Martina Lenić
May 5
DDoS attacks on your Azure environment? Azure DDoS Protection got you covered
DDoS attacks on your Azure environment? Azure DDoS Protection got you covered
“A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or…
Vedran Brodar
Apr 9
Introduction to Reverse Engineering
Introduction to Reverse Engineering
Table of Contents
Hrvoje Filaković
Mar 26
CrowdStrike — moving EDR/MDR/XDR boundaries and making it worth
CrowdStrike — moving EDR/MDR/XDR boundaries and making it worth
For several years, CrowdStrike has been recognized as a Leader for EDR (Endpoint Detection and Response) and EPP (Endpoint Protection…
Martina Lenić
Feb 14
Defend your Azure environment with Microsoft Defender for Cloud
Defend your Azure environment with Microsoft Defender for Cloud
You have your Azure environment set up and now you are wondering what you can do to protect your deployed resources. Well, I’m here to help…
Vedran Brodar
Jan 24
Want to become Azure Cloud certified? Say no more!
Want to become Azure Cloud certified? Say no more!
In my previous article I wrote about the cybersecurity skill gap and how to fix it. As promised, this article will be more focused on cloud…
Vedran Brodar
Dec 20, 2023
About Cyberdnevnik
Latest Stories
Archive
About Medium
Terms
Privacy
Teams