PinnedPublished inDetect FYIFrom Zero to Expert level Detection Engineering with Elastic’s Maturity ModelOne of the biggest hurdles for a burgeoning detection engineer is convincing your business that you need detection engineering.Oct 5, 2024Oct 5, 2024
PinnedPublished inDetect FYIThe Structure and Taxonomy of a Detection Knowledge BaseOne of the most critical aspects of a detection engineering program is the documentation. Without documentation, your SOC is flying blind…May 9, 2024A response icon2May 9, 2024A response icon2
PinnedHow I take notes as a Cybersecurity EngineerAs you’ll probably be able to relate, I love reading. In particular, I love reading about cybersecurity. Ever since I was a kid, I was…Jan 10, 2023Jan 10, 2023
Published inDetect FYIRe-Writing the Playbook — A detection-driven approach to Incident ResponseWhen was the last time you looked at one of your incident response playbooks?Oct 15A response icon2Oct 15A response icon2
Published inDetect FYIDo you know your Detection Surface?Attackers think in graphs, defenders think in… Confluence pages?Jun 2Jun 2
Published inDetect FYIIf you’ve ever worked within security engineering or as an analyst producing any kind of output in…For the purposes of this post, we’ll be focusing on the very beginning of a detection development pipeline — the use case intake process…Dec 29, 2024A response icon1Dec 29, 2024A response icon1
Recently I’ve been connecting up all my different home lab services to Discord as a central…First, you’ll need to create a Discord server and create an integration. You can find out [how to do that…Mar 2, 2024Mar 2, 2024
The Joy of Using Excalidraw for EverythingAs a heavy Obsidian user, I’ve come to rely on for it many of my day to day tasks. As a security engineer, I’m regularly having to create…Feb 17, 2024Feb 17, 2024
Why you shouldn’t deploy the Azure Monitor Agent on Client Devices, and the Cost of Closing…In one of my blogs a very long time ago, I wrote about some discrepancies I found in the Defender file creation events in Microsoft…Feb 7, 2024Feb 7, 2024
You should be Exploiting your ProcrastinationProcrastination is something that afflicts all of us without exception — a perceived kind of mental vulnerability that exists within…Jan 26, 2024Jan 26, 2024