It only took me half a year since its UK release, but I’ve finally finished reading InfoSec Rock Star, a book written by one of my old SANS instructors that touches on everything from dress codes to negotiation tactics for cyber security professionals.
I don’t know about everyone else, but I sometimes find that self-motivated cyber security learning can be a bit of a tricky business, and it can be hard to know where to start.
Splunk is a powerful tool, but with so many available functions and hit-and-miss coverage on forums it can sometimes take some trial and error to get queries right. Here’s what I pieced together to perform a count on a subset of events and group the data by two fields…
We all use passwords every day, but how exactly do they work? It would be easy to assume that the services we use all hold huge databases with our usernames and passwords side by side, but the reality is much more interesting – and, of course, much more secure.
The security operations centre (SOC) is the heart of a firm’s cyber defences. Here are the basic elements and processes that a SOC uses to monitor for and respond to security incidents.