recent publications

From a Log to the Threat Hunting

Guide to an effective IR Playbook

read
From a Log to the Threat Hunting

A classic of Social Engineering: Homographic Domains

read
From a Log to the Threat Hunting

Policy as Code 101

read
From a Log to the Threat Hunting

First steps: Continuous Threat Exposure Management

read
From a Log to the Threat Hunting

Stealer logs, recognizing forgotten logs

read
From a Log to the Threat Hunting

Red Team exercises, towards a continuous approach

read
From a Log to the Threat Hunting

AI Law - Securing the first steps

read
From a Log to the Threat Hunting

Three decades of cyberdeception techniques

read
From a Log to the Threat Hunting

Trends in the context of cyberwarfare

read
From a Log to the Threat Hunting

AI applied to Cybersecurity

read
From a Log to the Threat Hunting

Transforming Data into Unique Identifiers

read
From a Log to the Threat Hunting

Metrics for simulation exercises

read
From a Log to the Threat Hunting

An approach to Threat Modeling

read
From a Log to the Threat Hunting

Small companies, big risks

read
From a Log to the Threat Hunting

DevSecOps Checklist

read
From a Log to the Threat Hunting

DevSecOps Checklist

read