U. T. OnyiaHarnessing AI for Cybersecurity: A Deep Dive into Threat Monitoring with Azure and Microsoft…Introduction6d ago
Truls TDinDetect FYIDeconstructing Security Monitoring AntipatternsWelcome back to another post — this time we are talking about antipatterns. If you don’t know what an antipattern is, we can describe it…Aug 19
Jeremyah JoelCyber Resilient Architecture: Leveraging Cyber Threat Intelligence to Combat Credential Theft…Hi all! It’s been a while since I’ve shared technical insights on Medium, and today’s deep dive into Cyber Threat Intelligence (CTI) from a…Sep 25Sep 25
Cyber News by Brianna RMastering Your Security Architect Interview: A Comprehensive GuideMar 281Mar 281
Aaron LZero Trust in Large Enterprises: From Buzzword to Budget-Friendly Reality or Still a Buzzword?As a Security Architect constantly juggling the trifecta of effectiveness, efficiency, and economy, I’ve been watching the Zero Trust model…Sep 19Sep 19
U. T. OnyiaHarnessing AI for Cybersecurity: A Deep Dive into Threat Monitoring with Azure and Microsoft…Introduction6d ago
Truls TDinDetect FYIDeconstructing Security Monitoring AntipatternsWelcome back to another post — this time we are talking about antipatterns. If you don’t know what an antipattern is, we can describe it…Aug 19
Jeremyah JoelCyber Resilient Architecture: Leveraging Cyber Threat Intelligence to Combat Credential Theft…Hi all! It’s been a while since I’ve shared technical insights on Medium, and today’s deep dive into Cyber Threat Intelligence (CTI) from a…Sep 25
Aaron LZero Trust in Large Enterprises: From Buzzword to Budget-Friendly Reality or Still a Buzzword?As a Security Architect constantly juggling the trifecta of effectiveness, efficiency, and economy, I’ve been watching the Zero Trust model…Sep 19
Aaron LOPA — Policy-As-Code Agents IntroductionWorking on Security Architecture, I am constantly on the lookout for a product to do more for less and at as cheap a price as possible. A…Sep 14
Nishant GroverSecurity Architects and Engineering teamNote: All views in this article are my personal and team structure differs upon organization size, infosec team size, and business…Jun 18, 2023