Published inInfoSec Write-upsPhase I — Implement free Microsoft IAM Services for Cloud-only IdentitiesA Cost-Effective Solution for SMEs (< 250) looking to establish their businesses in Public CloudMar 20Mar 20
How to Build Resilience in Small-Medium-Sized Enterprises from Cyber Attacks?Baseline Security for SMEs to operate effectively during cyberattacksMar 6Mar 6
Detecting Threats and Responding with KQL in Microsoft SentinelStrengthening Security Posture with KQL-based threat huntingFeb 21Feb 21
Published inInfoSec Write-upsEnhance your Incident Investigation and Response capabilities with Palo Alto Cortex XDRA threat-hunting platform for robust protection and rapid resolutionFeb 19Feb 19
Published inInfoSec Write-upsHands-on Introduction to Microsoft KQLGetting started with KQL QueriesFeb 15Feb 15
How to secure your Cloud: Deploy Microsoft Sentinel in AzureStrengthening Your Cloud Security Posture in AzureFeb 41Feb 41
Published inInfoSec Write-upsSANS 2022 Holiday Hack Challenge & KringleConPCAP file & Windows event logs investigationJan 15, 2023Jan 15, 2023
Published inInfoSec Write-upsPerforming Security Gap Analysis using Breach & Attack Simulation (BAS) ToolsContinuous Testing and Auditing - Purple Teaming ActivityDec 24, 2022Dec 24, 2022
CISSP Domain 3 Notes - Security Architecture and EngineeringStudy Guide 9th editionDec 19, 2022Dec 19, 2022
Published inInfoSec Write-upsUsing Threat Intelligence data to generate MISP alertsThere are various Threat Intelligence sources that shares threat information with each other to help identify those threats in their…Dec 15, 2022Dec 15, 2022