2023

Creating your own virtual playground

In the dynamic and ever-evolving field of cybersecurity, maintaining a proactive approach toward skill development and continuous education is imperative. As a professional in this sector, it is essential not only to stay abreast of the latest advancements but also to actively contribute to the enhancement of your knowledge and expertise.

December 24, 2023

Fluency — An industry disruptor?

As reiterated consistently on this platform, the conventional SIEM solution, primarily relying on signature-based detection methods, has undeniably reached a point of obsolescence. Cybersecurity threats are evolving rapidly, rendering signature-based approaches insufficient in addressing the dynamic and sophisticated nature of contemporary attacks. Despite this, there persists a prevailing belief in the indispensable role of a SIEM solution in fortifying an organization’s cybersecurity posture.

December 3, 2023

When was the most recent instance in which you performed OSINT on yourself?

In our ever more interconnected and digital world, it might, at first, appear counterintuitive to champion the practice of conducting OSINT on the very company you are entrusted to safeguard. However, this seemingly paradoxical notion underscores a fundamental truth in the realm of cybersecurity and corporate defense — if you can access information about your organization through OSINT techniques, so too can malicious actors with potentially nefarious intent.

November 5, 2023

Hey data scientist, are you really listening to the security data?

Protecting your company against the evolving landscape of both current and past threats is a formidable challenge, one that some consider insurmountable. However, it’s crucial to remember that while it may be a daunting task, it should not be perceived as impossible. In fact, it’s imperative to recognize that modern security strategies need to adapt to the ever-changing nature of cyber threats. This adaptation relies on the effective utilization of data generated by security controls, a process that transforms raw data into actionable events.

October 29, 2023

The ‘lazy’ SOC model

In the contemporary landscape, the paramount importance of security is becoming increasingly evident, casting a spotlight on the escalating workload of the SOC. This burgeoning workload is characterized not only by a surge in the sheer volume of requests and inquiries but also by the growing intricacy of security challenges. In this dynamic environment, when a security incident unfolds, there is an implicit expectation for the SOC to respond promptly and with pinpoint accuracy. Simultaneously, the SOC grapples with a persistent conundrum exacerbated by a global shortage of highly skilled security professionals — recruitment and retention.

October 22, 2023

Do you really need a dedicated SOC for the OT-environment?

By adhering strictly to the Purdue model, your OT environment will exclusively consist of essential devices required for seamless factory operations, effectively mitigating IT-related threats. However, as is often the case, theory and practice diverge. In reality, the situation is more intricate. Let’s delve into the myriad facets of this issue to help you determine the optimal approach for your environment.

September 17, 2023

The question is not if but when

In today’s interconnected and digitized landscape, the inevitability of cyberattacks has transformed the question from a matter of ‘if’ to a matter of ‘when’. This paradigm shift underscores the critical importance of cybersecurity preparedness in the modern world. The notion that organizations and individuals will eventually experience a breach has compelled a shift from a reactive approach to a proactive and strategic stance in safeguarding digital assets.

August 27, 2023

Can ChatGPT takeover the role as a use case developer?

Currently, many people are talking about ChatGPT and how it will affect everybody’s life. Some (including me) are also investigating it. Therefore, let’s put it to the test. Does ChatGPT know how to find the right and relevant information to design and implement a use case around a password spray attack? Put differently, can ChatGPT replace the use case developer?

May 21, 2023

Can you piece back the puzzle of the timeline?

Sooner or later, the environment you are responsible for will be hit by a security incident. Small or big. But no matter how significant the incident is, the high-level steps to remediate the incident are the same. Identification, containment, eradication, and post-mortem. And each of these steps has one thing in common. The timeline. In order to contain the incident, you need to find both Patient Zero and Moment Zero. Most people are familiar with the term Patient Zero. But what is Moment Zero?

April 22, 2023