recent publications

From a Log to the Threat Hunting

An approach to Threat Modeling

read
From a Log to the Threat Hunting

Small companies, big risks

read
From a Log to the Threat Hunting

DevSecOps Checklist

read
From a Log to the Threat Hunting

DevSecOps Checklist

read
From a Log to the Threat Hunting

Bitlocker in a Post-Pandemic context

read
From a Log to the Threat Hunting

Vulnerabilities in Pipelines

read
From a Log to the Threat Hunting

Unconventional Phishing Techniques

read
From a Log to the Threat Hunting

Cyber Deception more than a lures

read
From a Log to the Threat Hunting

OSINT - Your behavior could be helping criminals

read
From a Log to the Threat Hunting

TOP 10 Microsoft Security Recommendations

read
From a Log to the Threat Hunting

Post-quantum cryptography challenges for organizations

read
From a Log to the Threat Hunting

Security architecture: basic principles

read
From a Log to the Threat Hunting

Toward a Science of Cybersecurity

read
From a Log to the Threat Hunting

Methodology of Tabletop Exercises

read
Follina a silent Client-Side

Forgotten Protocols: IPMI

read
From a Log to the Threat Hunting

Design Thinking applied to Cybersecurity

read