
Security Analytics Using ELK
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]
An important aspect of effective threat hunting is to understand what is normal in an environment. If a threat hunter […]
Before we start to configure our decoys and put it in our production environment, let’s take a look at what […]
Most organizations face a barrage of attacks every day from threat actors around the globe. Among the various vectors, attackers […]