@fuffsecDetection at Scale: Core ChallengesAs teams grow and the scope of detection expands, adapting to the increased scale becomes a critical challenge. This often requires teams…Aug 23
Andrew BloomaninAWS TipStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.Jul 2811
SithuminzinUnderstanding the Microsoft Outlook Vulnerability: CVE-2024–21413 (Moniker Link)Hello everyone,Jul 29Jul 29
David FrenchinthreatpunterFrom soup to nuts: Building a Detection-as-Code pipelinePart 1 of 2Jul 27, 20231Jul 27, 20231
DannyWhat Detection Can Look Like: Open Source OptionsPreviously, we talked about Detection Engineering and how it has become a career path within Cybersecurity. What used to be subset of the…Jul 22Jul 22
@fuffsecDetection at Scale: Core ChallengesAs teams grow and the scope of detection expands, adapting to the increased scale becomes a critical challenge. This often requires teams…Aug 23
Andrew BloomaninAWS TipStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.Jul 2811
SithuminzinUnderstanding the Microsoft Outlook Vulnerability: CVE-2024–21413 (Moniker Link)Hello everyone,Jul 29
David FrenchinthreatpunterFrom soup to nuts: Building a Detection-as-Code pipelinePart 1 of 2Jul 27, 20231
DannyWhat Detection Can Look Like: Open Source OptionsPreviously, we talked about Detection Engineering and how it has become a career path within Cybersecurity. What used to be subset of the…Jul 22
Julie Agnes SparksDemystifying the Process: Threat Detection Engineering InterviewsLet’s dive into all the aspects of a Detection & Response engineering interview.Apr 261
Jacob LummusA quick note on Logic App and Detection Rule validation in Azure SentinelA lot of the time when I’ve been building logic apps it becomes difficult to test any and all conditions in the logic application’s flow…Jul 13
br4dy5Detection Engineering Fundamentals: What makes a good alert?If you find yourself developing custom detections to fill detection gaps in your environment, you may ask yourself: what does a good alert…Jun 262