Menu

Detection Engineering and Detection as Code

In the ever-evolving landscape of cybersecurity, traditional methods of threat detection and response are no longer sufficient to keep up with the growing complexity and sophistication of cyber threats. As organizations become more reliant on digital infrastructure, the need for a more agile, efficient, and scalable approach to security has never been greater. This is where Detection as Code and Detection Engineering come into play.

Most Common MITRE Att&ck Techniques

This blog series will delve into the most prevalent techniques observed across various incidents and attack groups, shedding light on the modus operandi of cybercriminals. By gaining insights into these common tactics, security professionals can enhance their defensive posture and better prepare for potential threats.

CCSP

My study notes for the CCSP exam. As the cloud becomes more prevalent in IT infrastructure, it is important to have a foundational knowledge of cloud concepts. This exam helps establish this knowledge.

Cryptohack

Cryptohack is a website to learn about cryptography. They use challenges to break bad implementations of cryptography.

WebGoat

WebGoat is a purposely vulnerable web application developed by OWASP to help teach students about the OWASP Top 10.

Blog

Thoughts and musings