Security Analytics Using ELK
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. Both sessions were great experiences […]
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. Both sessions were great experiences […]
An important aspect of effective threat hunting is to understand what is normal in an environment. If a threat hunter is able to baseline the […]
Before we start to configure our decoys and put it in our production environment, let’s take a look at what exactly it is and how […]
Most organizations face a barrage of attacks every day from threat actors around the globe. Among the various vectors, attackers have found relatively high degree […]