Blog

Welcome to my cybersecurity blog. We'll primarily focus on delving into theory and offering technical guidance in the field of detection engineering. Following this, in alignment with my own expertise, we'll delve into a wide range of topics, with the overarching objective of fostering mutual learning and knowledge exchange among all participants.

May 9, 2025

/

Compliance

/

2 Min

Read

SOC 2 Survival Guide: How to Prepare Your Company for a Stress-Free Audit

Step-by-step for companies tackling their first SOC 2 assessment. If you're reading this, chances are your company is either getting bigger, signing larger customers, or entering new industries and you've just been asked the question: "Are you SOC 2 compliant?" Welcome to the club. SOC 2 is a major milestone for growing companies, but it doesn’t have to be painful. In fact, with a little preparation and the right mindset, you can turn your SOC 2 Type 1 audit into a strategic win instead of a stress-fueled scramble. This guide will break down the process step-by-step to make your first audit as smooth (and drama-free) as possible.

May 2, 2025

/

Detection Engineering

/

5 Min

Read

Coordinated Attack Detection: Maximal Clique Enumeration with Caching

When defending cloud environments, one of the most critical challenges is detecting coordinated attacks where multiple attackers attempt to compromise the same resource or endpoint. These attacks can be subtle, with attackers using different IPs to target a common resource. Traditional detection methods, such as signature-based or brute-force detection, often fail to spot these more sophisticated attacks. But here's the exciting part: By leveraging Maximal Clique Enumeration and caching in Panther, we can detect coordinated activities where multiple IP addresses target the same resource in a short time window without needing complex machine learning models or expensive SIEM pipelines.

Apr 25, 2025

/

Detection Engineering

/

5 Min

Read

Detecting Unusual URL Sequences in Cloudflare Logs Using Markov Chains and Caching

When I first started looking for a way to detect automated attacks like bots or scripted attacks in web traffic, I ran into a familiar problem: most of the available solutions were either too complex (machine learning models, heavy SIEM setups) or too rigid (static pattern matching, manual rule writing). I needed something practical, lightweight, and, importantly, Pythonic. Then I had a breakthrough: what if I could detect abnormal sequences of URLs accessed by the same IP address? After all, bots and automated scripts tend to follow very predictable patterns, whereas legitimate user behavior is often more erratic. That’s when I realized: I could use a simple technique from statistics Markov Chains to track these sequences and flag the ones that looked suspicious.

Apr 18, 2025

/

Detection Engineering

/

5 Min

Read

Detecting C2 Beaconing in VPC Flow Logs With Pythonic Periodicity Check

In C2 communications, infected hosts "call home" to a malicious server on a fixed or jittered schedule. It might be every 30 seconds, or maybe it’s random-ish; 45s, 47s, 49s but it’s still periodic. These "beacons" are subtle. They don’t transfer much data. They’re fast. And they’re easy to miss with traditional detection methods. But here’s the key: even jittered beacons form patterns and patterns can be caught with basic signal analysis techniques.

Mar 21, 2025

/

Detection Engineering

/

1 Min

Read

Understanding Alert Thresholding in Detection Engineering

Effective detection engineering requires a careful balance between capturing real threats and minimizing alert fatigue. Without proper controls, excessive alerts can overwhelm security teams, while overly restrictive thresholds may allow threats to go unnoticed. This is where alert thresholding comes in a method to set predefined limits on alert volume to ensure detections remain effective and manageable.

Nov 10, 2024

/

Log Analysis

/

5 Min

Read

An Overview of Analyzing Schema Duplication with NLP

Our study of 207 schemas from Panther revealed significant redundancies, with some schemas containing over 80% duplicate fields. By addressing these duplications, organizations can streamline their log management processes and optimize storage and processing requirements.

Oct 7, 2024

/

Detection Engineering

/

1 Min

Read

DDLC - Threat Modeling

Threat modeling is a critical component in detection engineering, guiding security teams in proactively identifying potential attack vectors and designing effective detection strategies. By creating a structured view of possible threats, organizations can prioritize their detection efforts, focusing on the most likely and impactful adversary tactics, techniques, and procedures (TTPs). This proactive approach not only strengthens defenses but also enhances the accuracy of alerts, reducing false positives and ensuring more reliable threat detection.

Sep 19, 2024

/

Detection Engineering

/

5 Min

Read

DDLC - Triage Phase

In detection engineering, effective triage is key to prioritizing and addressing security threats efficiently. As the second phase in the detection engineering process, triage involves assessing and ranking alerts based on factors like threat severity, alignment, coverage, and active exploit presence. By thoughtfully triaging each alert, detection engineers can focus their resources on the most pressing and impactful threats, optimizing security efforts.

Aug 12, 2024

/

Detection Engineering

/

5 Min

Read

DDLC - Discovery Phase

The Detection Engineering Lifecycle begins with gathering detection requirements. A crucial phase influenced by threat intelligence, red team exercises, business security demands, and insights from security operations. A successful requirements gathering phase ensures valuable input from various departments, making detection development more efficient and minimizing time spent tracking down information.

Jul 18, 2024

/

Detection Engineering

/

5 Min

Read

Detection Development Lifecycle (DDLC) Overview

The Detection Development Lifecycle (DDLC) is a DevOps-inspired framework designed to streamline the creation, deployment, and management of detection rules, empowering security professionals to keep pace with evolving threats. By integrating key phases and controls, the DDLC ensures a structured approach to managing detection rules effectively.

Jun 10, 2024

/

Data Ingestion

/

2 Min

Read

The 3 C’s of Effective Log Management & Collection in Detection Engineering

Effective log management and collection, crucial for cybersecurity, enhance threat detection, incident analysis, and compliance through a comprehensive approach that includes gathering logs from various sources and managing them via versioned, and scalable systems. Addressing challenges such as data volume and diverse formats, this practice requires innovative tools, skilled personnel, and regular audits, forming the backbone of a robust security framework capable of navigating the complexities of a dynamic cyber environment.

Mar 10, 2024

/

Security Strategy

/

15 Min

Read

Done is Not Enough: The Illusion of Completion and the Pitfalls of Getting It Wrong

In the high-speed environment that defines much of today's tech industry, the "get it done asap" mindset often overshadows the critical "get it done right" approach. This race against time is frequently fueled by an internal competitive culture, where teams are pitted against each other to deliver results the fastest, a checkbox culture that values the quantity of completed tasks over their quality, or direct pressure from leadership pushing for deliverables within unreasonable timelines.

Jan 23, 2024

/

Detection Engineering

/

30 Min

Read

Evaluating A Detection Engineering Program

Lets review a framework for a detection engineering program evaluation. It emphasizes aligning detection goals with business objectives, using key metrics for assessment, and exploring various detection methods from signature-based to AI-driven. The approach champions continuous feedback, technology evaluations, staff training, and stakeholder engagement, all while benchmarking against industry standards and ensuring adaptability to emerging threats.

Nov 16, 2023

/

Detection Engineering

/

2 Min

Read

Introducing The Art of Threat Modeling for Detection Engineering

The roots of this framework stem from the one thing that detection engineers must have to operate: logs. By identifying and classifying log sources, we can outline potential attacks that an asset might be exposed to in a shareable model.

©2026 Asante Babers

©2026 Asante Babers