My Iteration of the Cloud Resume Challenge: Building It Like a Cloud Engineer
I recently took on my own version of the Cloud Resume Challenge. Instead of following the template step by step, I approached it the way I would build a real…
I recently took on my own version of the Cloud Resume Challenge. Instead of following the template step by step, I approached it the way I would build a real…
Small businesses often underestimate their appeal to cybercriminals, assuming that only large corporations with vast resources are at risk. However, the reality is quite the opposite. Small enterprises are prime…
Question 200 What was the most likely IPv4 address of we8105desk on 24AUG2016? We have the name of the computer, and the time interval of interest so we can craft…
Various datasets online can help with practicing threat hunting. The Boss of the SOC dataset v1, released by Splunk is one of them. So I deployed a Splunk instance on…
Here are some quick notes I compiled as I was learning and experiencing with threat hunting Broad definition Threat hunting is a methodology in which the defenders assume the system/network…
Here is yet another Infosec lab to test cybersecurity tools. However, with just a laptop available at the moment, the idea is to leverage the Cloud to expand computing power.…
Governance, Risk management and Compliance, in other words GRC, is a cybersecurity domain at the intersection of People, Processes and Technologies. It aims to structure the way in which companies…