Kevin TimDeploying Wazuh in Local Kubernetes Environment: Simplifying Security MonitoringAs organizations increasingly adopt microservices architectures and containerization, the need for proactive security measures becomes more…18h ago
Anton ChuvakininAnton on SecurityMigrate Off That Old SIEM Already!This is cross-posted from Google Cloud Community site, and written jointly with Dave Herrald.Feb 53
Ahmed NosirUnderstanding the Difference Between Cyber Kill Chain and MITRE ATT&CKEvery day, thousands of people experience cybersecurity issues. These risks are increasing steadily, and ignoring them can lead to costly…Jun 1Jun 1
Ahmed NosirSecurity Automation Series: Part 2 — Preparing Your Testing EnvironmentWelcome back to our “Security Automation Series.” In the first part, I shared my personal journey of overcoming the overwhelming tasks in…Jun 30Jun 30
3EyedR@venLearning Journey: Offensive Security Defensive Analyst (OSDA) certificationSharing on the learning journey of attaining OSDA certificationMar 14Mar 14
Kevin TimDeploying Wazuh in Local Kubernetes Environment: Simplifying Security MonitoringAs organizations increasingly adopt microservices architectures and containerization, the need for proactive security measures becomes more…18h ago
Anton ChuvakininAnton on SecurityMigrate Off That Old SIEM Already!This is cross-posted from Google Cloud Community site, and written jointly with Dave Herrald.Feb 53
Ahmed NosirUnderstanding the Difference Between Cyber Kill Chain and MITRE ATT&CKEvery day, thousands of people experience cybersecurity issues. These risks are increasing steadily, and ignoring them can lead to costly…Jun 1
Ahmed NosirSecurity Automation Series: Part 2 — Preparing Your Testing EnvironmentWelcome back to our “Security Automation Series.” In the first part, I shared my personal journey of overcoming the overwhelming tasks in…Jun 30
3EyedR@venLearning Journey: Offensive Security Defensive Analyst (OSDA) certificationSharing on the learning journey of attaining OSDA certificationMar 14
Stijn HolzhauerMapping the cohesion between NIST CSF and MITRE DefendHow you can view and combine the power of NIST CSF and MITRE D3FEND to create a cohesive tactical & operational view on secops.Jun 27
Samuel HassineinFiligran BlogNew OCTI dashboards: the first graph dashboarding engine for the STIX modelWhen we’ve started working on Key Performance Indicators (KPI), trends modelization and graphical representation of the Cyber Threat…Jan 15, 2023
Stijn HolzhauerBuilding a SOC on Elastic Stack — prologueIn June of 2019 Elastic released the initial SIEM app in the Elastic Stack and since then has been iterating on the solution. Providing an…Jun 26