Articles
-
20 Jun 2022
How Does The Zero-Trust Architecture Work
Zero-Trust is such a buzzword these days and yet there is little documentation online on how to build one. I recently...
-
18 Nov 2021
10 Lessons Learned While Looking for a Security Job
We've all been at that point in our career - when we feel we haven't progressed much lately, especially if we invest ...
-
07 Apr 2021
How to Crack the CISSP Certification
CISSP is by far one of the most craved certifications for security professionals. And it is rightly so, considering t...
-
06 Apr 2021
How to Improve Your Defensive Strategy by Using Cyber Deception, Honeypots and MITRE Shield
Defending against attackers can feel at times a lost cause - motivated and well-funded attackers have good tools, imp...
-
12 Jun 2020
How I passed TOGAF 9.2 Part 1
Last year I decided to take the TOGAF exam. I made a plan, I read on reddit and around the Internet how others passed...
-
23 May 2020
Why are Honeypots Not Widely Used
A few weeks ago a friend of mine approached me to discuss on honeypots. He couldn’t understand why nobody seems to us...
-
22 Apr 2020
Designing a Threat Hunting Process and a SOC Management Platform based on MITRE ATT&CK and SPLUNK
Last March I attended the SplunkLive! 2020 event where Splunk and some of their clients shared their experience on us...
-
19 Nov 2019
Steps to Crack Passwords
There are many articles out there explaining what password cracking means, tools that you can use and many other usef...
-
16 Nov 2019
How to Create Custom IDS Models
Creating your own IDS custom models is not a difficult task, although it might require a lot of patience and time, de...
-
16 Sep 2019
7 Ideas of Custom Models for your Intrusion Detection System
Intrusion Detection Systems come with a predefined set of models they use as patterns to look out for anomalous netwo...
-
31 Aug 2019
How to Develop Your Own NAC
1. In a NutshellIf your budget is limited and NACs are found to be expensive, you could try to implement a basic NAC ...
-
02 Aug 2019
Guidelines to Configure Your EDR
1. IntroductionAn Endpoint Detection and Response (EDR) system is similar with a personal anti-virus (EDR). However, ...
-
31 Jul 2019
Introduction to Network Access Control System
Though Network Access Control (NAC) systems are not as common as IDS and EDR solutions, they are in fact incredibly u...
-
31 Jul 2019
Best Email Signing and Encryption Solutions
Hi and welcome! I was honored to present this topic at #dc4420. You can read here everything I presented if you’d lik...
-
14 Jan 2019
Rapid Threat Model Prototyping
Last year I had the opportunity to take part to one of Geoffrey Hill’s presentation about the Rapid Threat Model Prot...