The SIEM Playbook: Strategies for Preventing Brute Force Cybersecurity Breaches
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?
- Nov 9, 2023
- 7 min
Let’s build a Cloud Network - 02: Internet Gateway and Route Tables
- Oct 16, 2023
- 5 min
Threat Hunting Metrics: The Good, The Bad and The Ugly
- Sep 25, 2023
- 6 min
Let’s build a Cloud Network- 01: VPC and Subnets
- Jul 31, 2023
- 7 min
Unraveling the Where: A Deep Dive into Geolocation (GEOINT) for OSINT
- Jul 4, 2023
- 3 min
Build a Threat Hunting Lab. Installing and Configuring Elasticsearch and Kibana
- Jun 19, 2023
- 8 min
How to Use the Ransomware Control Matrix: A Step-by-Step Guide
- Jun 5, 2023
- 11 min
Brace for Impacket!
- May 8, 2023
- 9 min
The Defender’s Guide to Windows Services
- Apr 10, 2023
- 5 min
Threat Hunting Series: Detection Engineering VS Threat Hunting
- Mar 27, 2023
- 8 min
The Defender’s Guide to the Windows Registry It’s dangerous to defend the registry alone! Take this!
- Feb 20, 2023
- 7 min
Catching a Wev(tutil): Threat Detection for the Rest of Us
- Nov 14, 2022
- 7 min
Threat Hunting Series: Using Threat Emulation for Threat Hunting
- Nov 7, 2022
- 4 min
SECURITY TOOLS FOR A CYBERSECURITY PROFESSIONAL
- Oct 24, 2022
- 6 min
Sticky Fingers in the Honey Pot
- Oct 10, 2022
- 12 min
Encryption and the CIA Triad
- Aug 22, 2022
- 5 min
Relapse of LAPSUS$: A Cyber Threat Intelligence Case Study
- Aug 15, 2022
- 7 min
Threat Hunting Series: What Makes a Good Threat Hunter
- Aug 8, 2022
- 4 min
Threat Hunting Series: The Basics
- Jun 13, 2022
- 2 min
Wireshark: A Forensic Investigation