2023

2023

Creating your own virtual playground

In the dynamic and ever-evolving field of cybersecurity, maintaining a proactive approach toward skill development and continuous education is imperative. As a professional in this sector, it is essential not only to stay abreast of the latest advancements but also to actively contribute to the enhancement of your knowledge and expertise.

December 24, 2023

Fluency — An industry disruptor?

As reiterated consistently on this platform, the conventional SIEM solution, primarily relying on signature-based detection methods, has undeniably reached a point of obsolescence. Cybersecurity threats are evolving rapidly, rendering signature-based approaches insufficient in addressing the dynamic and sophisticated nature of contemporary attacks. Despite this, there persists a prevailing belief in the indispensable role of a SIEM solution in fortifying an organization’s cybersecurity posture.

December 3, 2023

CVSS v4.0 — An improvement or not?

The introduction of a new version typically implies an evolution, marked by improvements and the incorporation of novel features. In the specific context of the CVSS calculator, it becomes pertinent to scrutinize the extensive alterations made to its specifications.

November 29, 2023

What if you can’t trust the processor?

Processor — the pulsating core of every device, orchestrating the intricate dance of data and commands with unparalleled speed and precision. It serves as the nerve center, tirelessly executing a multitude of instructions to bring digital tasks to life. However, this very prowess renders it susceptible to vulnerabilities that have evolved alongside the relentless pursuit of performance.

November 19, 2023

So, you can’t patch a vulnerability, now what? (part 2)

Safeguarding your organization’s systems and software from the exploitation of vulnerabilities is undeniably a paramount concern in the realm of cybersecurity. This imperative task necessitates a multifaceted approach, with the central pillars being the installation of security patches and the fine-tuning of configuration settings. However, it’s crucial to acknowledge that...

November 12, 2023

When was the most recent instance in which you performed OSINT on yourself?

In our ever more interconnected and digital world, it might, at first, appear counterintuitive to champion the practice of conducting OSINT on the very company you are entrusted to safeguard. However, this seemingly paradoxical notion underscores a fundamental truth in the realm of cybersecurity and corporate defense — if you can access information about your organization through OSINT techniques, so too can malicious actors with potentially nefarious intent.

November 5, 2023

Hey data scientist, are you really listening to the security data?

Protecting your company against the evolving landscape of both current and past threats is a formidable challenge, one that some consider insurmountable. However, it’s crucial to remember that while it may be a daunting task, it should not be perceived as impossible. In fact, it’s imperative to recognize that modern security strategies need to adapt to the ever-changing nature of cyber threats. This adaptation relies on the effective utilization of data generated by security controls, a process that transforms raw data into actionable events.

October 29, 2023

The ‘lazy’ SOC model

In the contemporary landscape, the paramount importance of security is becoming increasingly evident, casting a spotlight on the escalating workload of the SOC. This burgeoning workload is characterized not only by a surge in the sheer volume of requests and inquiries but also by the growing intricacy of security challenges. In this dynamic environment, when a security incident unfolds, there is an implicit expectation for the SOC to respond promptly and with pinpoint accuracy. Simultaneously, the SOC grapples with a persistent conundrum exacerbated by a global shortage of highly skilled security professionals — recruitment and retention.

October 22, 2023

The importance of having a data scientist team in Cyber Security Center

Numerous parallels exist between the strategic board game ‘Stratego’ and the operation of a Cyber Operation Center. In ‘Stratego,’ you engage in one-on-one gameplay, but within the Cyber Security Center, you’re navigating multiple games simultaneously. Your objective remains steadfast: safeguard the flag for as long as possible, while adversaries relentlessly pursue its conquest. The distinguishing factor lies in the dynamics of these engagements. While you’re simultaneously managing multiple fronts, your adversaries can opt to focus on one game at a time. At first glance, this might appear unequal, almost like an unfair contest. However, it shouldn’t be.

October 16, 2023

AI and Security: A Perfect Union?

Artificial Intelligence, commonly referred to as AI, has undeniably become the prevailing marketing buzzword in recent times. The excitement surrounding AI is palpable, and it has captured the imagination of industries and individuals alike. However, the crucial question is whether AI can truly live up to these soaring expectations. In my view, the answer is a cautious one; the current state of AI, though promising, still carries certain limitations due to its emerging and relatively immature nature.

October 15, 2023