-
InfoSec Playbook
Read more: InfoSec PlaybookAs Aesop says, “Good things come in small packages” and this week’s post we’ll label as a small package. The book I finished this week is called “Crafting the InfoSec Playbook”, which is written for those looking to improve their SOC or incident response (IR) teams. This book does a good job laying out all…
-
Structuring Chaos – Applied NSM
Read more: Structuring Chaos – Applied NSMIn the world of cybersecurity, the process of monitoring a network is daunting and when you’re new to this field it can get overwhelming quickly. The reason for this immediate overwhelm is due to all the different tools and terminology thrown around by more experienced cybergeeks. A way to speed up the learning process and…
-
Bread Crumbs (IOCs)
Read more: Bread Crumbs (IOCs)In the realm of cyber, there are two main ways of detecting an evildoer, which is either through a signature or an anomaly. These two ways of detecting are topics we’ll dive deeper into in the future, but for now, all you need to know is that both detection methods use a thing called “Indicators…
-
Passive Security (NSM)
Read more: Passive Security (NSM)The process of defending a network can be overwhelmingly complicated for any newcomer into the realm of cybersecurity. This process can include many tools, data types, and specific steps. There are two main approaches to tackling a complex topic… Both approaches have their place, but this time we’re going to aim before we fire (e.g.…
-
Sniffing the Internet
Read more: Sniffing the InternetAll of our digital activity like messaging friends via FB, watching Netflix, sending emails, or uploading our precious cat photos to Instagram is just the tip of what’s happening. Beneath these surface-level interactions is an entire world of activity where machines are talking constantly, ensuring we humans can easily do what humans do… watch Netflix… …
Subscribe