top of page
CYBERSOCURITY
DIARIES
GUIDE TO BUILDING
YOUR CYBERSECURITY RESILIENCE



Practical OSINT Strategies in Daily Cybersecurity
OSINT means Open-Source Intelligence which is an important skill for professionals. To understand what it means in the practical life we...
20

Using Crowdstrike to ingest and correlate logs for Microsoft Entra (Azure AD)
for improved visibility and compliance with the NIS2 framework Nowadays cybersecurity and compliance with various intergovernmental...
28

Why Do Cybercriminals Like Legacy Antivirus?
Legacy antivirus (AV) is no longer capable of stopping adversaries. Modern endpoint security is required to stop breaches — period.
25

Why Security Awareness Training is crucial?
Why do users need Security Education and why Proofpoint Security Awareness Training is better than others?
28

Introducing our Vendors
As our colleagues often say: cybersecurity is like playing with LEGO bricks – you need to assemble systems block by block, which is both...
132

Threat Hunting - in nutsh3ll
Prelude The purpose of this article is to give the reader the overview of a threat hunting method. Also how to fit threat hunting in SOC....
74
bottom of page