Centralised Open Source Logging for Falco Across Multiple Cloud AccountsIf you haven’t worked with Kubernetes runtime logging before, think of it as the equivalent of network traffic analysis in an on-prem…Feb 21Feb 21
Search for Data in GZIP-FilesAnalysing log files is critical for a cyber security professional. However, finding the desired data among very large log files is not…Feb 29, 2024Feb 29, 2024
Leveraging AI to Enhance Blue Team Analysts’ SkillsIn the realm of 2024 cyber-security trends, AI is undeniably taking the lead. It’s clear that cyber-attacks will become more sophisticated…Feb 7, 2024Feb 7, 2024
A Practical Guideline to Improve Blue Team AnalystsEveryone is already aware of how sophisticated cyber security has become with each passing day. On LinkedIn, I frequently come across…Feb 3, 2024Feb 3, 2024