Awareness, Blue Team, General, How To Start In Security, Incident Response, Links, Network Security Monitoring, Pentesting, SANS, Security Operations, Threat Hunting
Do you want to learn how to ‘Blue Team’? Start with “Time Based Security”.
Also available on LinkedIn “We’ve been looking at security the wrong way […] Fortress Mentality insists that building tall electronic walls is how to keep […]
General, How To Start In Security, Papers & Presentations, Training
En Málaga o en Nueva York: Cómo ‘hackear’ tu carrera en ciberseguridad (Spanish)
En esta sesión compartiré recomendaciones y experiencias útiles, tanto para aquellos que quieren desarrollar su carrera en ciberseguridad, como aquellos que quieren impulsarla y desarrollar todo su potencial.
Incident Response, Papers & Presentations, Security Operations, Threat Hunting, Threat Intelligence, Tools
Getting SecOps Foundations Right with Techniques, Tactics, and Procedures Zero (TTP0)
TTP0 is a new community project created by SecOps (Security Operations) practitioners for SecOps practitioners
Papers & Presentations, SANS, Security Operations, Threat Intelligence
Intelligence Driven Defense: Successfully Embedding Cyber Threat Intel in Security Operations
Being able to tell a compelling story that can answer key questions like: who is attacking us, what is their motivation, were they here before, how do they operate, what is the impact to our business, and will they come back, should be one of the ultimate goals of any effective blue team. However, being successful at embedding cyber threat intel in SecOps require something else: maintaining a solid understanding of the environment we are defending, as well as a systematic way to identify and prioritize applicable threats and assess impact, so we can respond appropriately to these attacks.
BlackHat, rastrea2r, Security Operations, Threat Intelligence, Tools
Speaking at BlackHat USA 2018
What is best that speaking at BlackHat USA? Doing it twice! I’m excited to announce that I’ll be speaking at BH USA for the 3rd […]
Network Security Monitoring, Threat Hunting
Disrupting the Disruptors: How to Threat Hunt Like a Pro
Read my article on how to threat hunt like a pro on Recorded Future’s blog: https://www.recordedfuture.com/cyber-threat-hunting/ Here’s an excerpt of this article: As the saying […]
Continuous Monitoring, Network Security Monitoring, Threat Hunting
My contribution to the “CDM From The Frontlines” ebook
Thanks to @TenableSecurity for asking me to contribute to their new ebook on Continuous Diagnostics & Mitigation: https://www.tenable.com/whitepapers/cdm-from-the-frontlines
Machine Learning: Practical Applications for Cyber Security
Each day, exponentially more data and computing power becomes available. We’re able to task machines to learn and understand more than ever before and, when combined with human analysis, this process can dramatically reduce laborious tasks. However, even with this surge in applicability, machine learning is still often considered a technology of the future.