recent publications

From a Log to the Threat Hunting

Three decades of cyberdeception techniques

read
From a Log to the Threat Hunting

Trends in the context of cyberwarfare

read
From a Log to the Threat Hunting

AI applied to Cybersecurity

read
From a Log to the Threat Hunting

Transforming Data into Unique Identifiers

read
From a Log to the Threat Hunting

Metrics for simulation exercises

read
From a Log to the Threat Hunting

An approach to Threat Modeling

read
From a Log to the Threat Hunting

Small companies, big risks

read
From a Log to the Threat Hunting

DevSecOps Checklist

read
From a Log to the Threat Hunting

DevSecOps Checklist

read
From a Log to the Threat Hunting

Bitlocker in a Post-Pandemic context

read
From a Log to the Threat Hunting

Vulnerabilities in Pipelines

read
From a Log to the Threat Hunting

Unconventional Phishing Techniques

read
From a Log to the Threat Hunting

Cyber Deception more than a lures

read
From a Log to the Threat Hunting

OSINT - Your behavior could be helping criminals

read
From a Log to the Threat Hunting

TOP 10 Microsoft Security Recommendations

read