Blog
Welcome to my cybersecurity blog. We'll primarily focus on delving into theory and offering technical guidance in the field of detection engineering. Following this, in alignment with my own expertise, we'll delve into a wide range of topics, with the overarching objective of fostering mutual learning and knowledge exchange among all participants.
Nov 10, 2024
/
Log Analysis
/
5 Min
Read
An Overview of Analyzing Schema Duplication with NLP
Our study of 207 schemas from Panther revealed significant redundancies, with some schemas containing over 80% duplicate fields. By addressing these duplications, organizations can streamline their log management processes and optimize storage and processing requirements.
Oct 7, 2024
/
Detection Engineering
/
1 Min
Read
DDLC - Threat Modeling
Threat modeling is a critical component in detection engineering, guiding security teams in proactively identifying potential attack vectors and designing effective detection strategies. By creating a structured view of possible threats, organizations can prioritize their detection efforts, focusing on the most likely and impactful adversary tactics, techniques, and procedures (TTPs). This proactive approach not only strengthens defenses but also enhances the accuracy of alerts, reducing false positives and ensuring more reliable threat detection.
Sep 19, 2024
/
Detection Engineering
/
5 Min
Read
DDLC - Triage Phase
In detection engineering, effective triage is key to prioritizing and addressing security threats efficiently. As the second phase in the detection engineering process, triage involves assessing and ranking alerts based on factors like threat severity, alignment, coverage, and active exploit presence. By thoughtfully triaging each alert, detection engineers can focus their resources on the most pressing and impactful threats, optimizing security efforts.
Aug 12, 2024
/
Detection Engineering
/
5 Min
Read
DDLC - Discovery Phase
The Detection Engineering Lifecycle begins with gathering detection requirements — a crucial phase influenced by threat intelligence, red team exercises, business security demands, and insights from security operations. A successful requirements gathering phase ensures valuable input from various departments, making detection development more efficient and minimizing time spent tracking down information.
Jul 18, 2024
/
Detection Engineering
/
5 Min
Read
Detection Development Lifecycle (DDLC) Overview
The Detection Development Lifecycle (DDLC) is a DevOps-inspired framework designed to streamline the creation, deployment, and management of detection rules, empowering security professionals to keep pace with evolving threats. By integrating key phases and controls, the DDLC ensures a structured approach to managing detection rules effectively.
Jun 10, 2024
/
Data Ingestion
/
2 Min
Read
The 3 C’s of Effective Log Management & Collection in Detection Engineering
Effective log management and collection, crucial for cybersecurity, enhance threat detection, incident analysis, and compliance through a comprehensive approach that includes gathering logs from various sources and managing them via versioned, and scalable systems. Addressing challenges such as data volume and diverse formats, this practice requires innovative tools, skilled personnel, and regular audits, forming the backbone of a robust security framework capable of navigating the complexities of a dynamic cyber environment.
Mar 10, 2024
/
Security Strategy
/
15 Min
Read
Done is Not Enough: The Illusion of Completion and the Pitfalls of Getting It Wrong
In the high-speed environment that defines much of today's tech industry, the "get it done asap" mindset often overshadows the critical "get it done right" approach. This race against time is frequently fueled by an internal competitive culture, where teams are pitted against each other to deliver results the fastest, a checkbox culture that values the quantity of completed tasks over their quality, or direct pressure from leadership pushing for deliverables within unreasonable timelines.
Jan 23, 2024
/
Detection Engineering
/
30 Min
Read
Evaluating A Detection Engineering Program
Lets review a framework for a detection engineering program evaluation. It emphasizes aligning detection goals with business objectives, using key metrics for assessment, and exploring various detection methods from signature-based to AI-driven. The approach champions continuous feedback, technology evaluations, staff training, and stakeholder engagement, all while benchmarking against industry standards and ensuring adaptability to emerging threats.
Dec 27, 2023
/
Security Strategy
/
5 Min
Read
Understanding the 'Eat the Cost' Mentality
In the realm of cybersecurity, the phrase "eating the cost" often surfaces during budget discussions or strategic planning meetings. Security leaders, faced with the complex task of safeguarding digital assets while balancing financial constraints, sometimes opt to absorb certain expenses as part of their operational strategy. This decision, while seemingly straightforward, underscores a deeper commitment to resilience and efficiency in the face of ever-evolving cyber threats.
Nov 16, 2023
/
Detection Engineering
/
2 Min
Read
Introducing The Art of Threat Modeling for Detection Engineering
The roots of this framework stem from the one thing that detection engineers must have to operate: logs. By identifying and classifying log sources, we can outline potential attacks that an asset might be exposed to in a shareable model.
Oct 31, 2023
/
Cybersecurity
/
1 Min
Read
Unveiling my personal blog
In this era dominated by digital technology, prioritizing cybersecurity has never been more critical. Reflecting on my decade of experience, accumulated alongside other cybersecurity experts, I am convinced that the moment has arrived for me to contribute and give back to the community.