Dickie Kai Ching KUHow to Establish Your First Threat Intelligence Program (Strategic)It is my belief that the majority of security practitioners understand Cyber Threat Intelligence (CTI) to be far more expansive than merely…Jul 7
Tom SmykowskiBulgaria Went Open Source: The Revisit After 7 Years7 years ago Bulgaria decided to open source software. We’ll visit Bulgaria to check the progress to discover some interesting thingsJan 214
Apoorva DixitinJavaScript in Plain EnglishSecuring Node.js in Production: Expert Practices for Every DeveloperAs web development keeps evolving, ensuring the security of your Node.js application becomes critical. This detailed guide steps beyond…Mar 1416Mar 1416
Dickie Kai Ching KUHow to Determine the Urgency of a Security Alert in a Structured WayIn Splunk Enterprise Security (ES), security alerts are referred to as Notable Events. These notable events are stored in a dedicated…Jun 20Jun 20
BI.ZONEHunting Down MS Exchange Attacks. Part 1. ProxyLogon (CVE-2021–26855, 26858, 27065, 26857)By Anton Medvedev, Demyan Sokolin, Vadim KhrykovApr 15, 20213Apr 15, 20213
Dickie Kai Ching KUHow to Establish Your First Threat Intelligence Program (Strategic)It is my belief that the majority of security practitioners understand Cyber Threat Intelligence (CTI) to be far more expansive than merely…Jul 7
Tom SmykowskiBulgaria Went Open Source: The Revisit After 7 Years7 years ago Bulgaria decided to open source software. We’ll visit Bulgaria to check the progress to discover some interesting thingsJan 214
Apoorva DixitinJavaScript in Plain EnglishSecuring Node.js in Production: Expert Practices for Every DeveloperAs web development keeps evolving, ensuring the security of your Node.js application becomes critical. This detailed guide steps beyond…Mar 1416
Dickie Kai Ching KUHow to Determine the Urgency of a Security Alert in a Structured WayIn Splunk Enterprise Security (ES), security alerts are referred to as Notable Events. These notable events are stored in a dedicated…Jun 20
BI.ZONEHunting Down MS Exchange Attacks. Part 1. ProxyLogon (CVE-2021–26855, 26858, 27065, 26857)By Anton Medvedev, Demyan Sokolin, Vadim KhrykovApr 15, 20213
Dickie Kai Ching KUKey Metrics for Evaluating Log UtilisationAs a Cyber Security Operations (SecOps) specialist, one query that often comes up from management is: “How well are we utilising the logs…Jun 15
Prasanna Bhaskaran SurendraninGoogle Cloud - CommunityBinary Authorization | Google CloudBinary AuthorizationDec 1, 2022
Opcito TechnologiesAISecOps: The future of security operations is intelligentThe digital landscape is constantly evolving, and so are the threats we face. Traditional security operations, reliant on manual analysis…Jun 10