Honeypots: Detection, Recon, and Misdirection A honeypot in cyber security is basically a trap that lures in attackers and can slow down the pace of an attack, gather actionable intelligence, and even alert an organization that an attack is occurring. In this blog,...
Introduction Are you preparing for the new Practical SOC Analyst Associate (PSAA) certification exam? As the creator of the certification and included SOC 101 training materials, I collected a few high-level tips to help you feel confident and prepared going into the...
In our roles as cybersecurity professionals, we often find ourselves drowning in a sea of data logs, unable to extract meaning and insight from the enormous amount of data. This is where the great trio of sed, awk, and grep can be put into action. In spite of the fact...
Introduction In recent years, the demand for skilled security professionals has grown as more organizations recognize the importance of investing in cybersecurity operations. However, this increased demand, paired with a growing interest in breaking into...
Introduction With the evolving sophistication and persistence of threat actors, there is no excuse for organizations to be unprepared to strategically and quickly respond to the inevitable—cybersecurity incidents. Among its many documented standards, the National...
Introduction Many people considering a cybersecurity career often gravitate towards red team operations and penetration testing because the media portrays them in an exciting and flattering light. However, it’s important to recognize that businesses often place even...