WELCOME TO CRONINITY
![]() | ![]() | ![]() |
|---|---|---|
![]() | ![]() | ![]() |
AI - The AI Supply Chain - Data Center Networks - Part 3 - Different types of AI Data Center Networks
AI's Multiple Networks: Understanding the Layers of Connectivity Modern AI infrastructure uses multiple specialized networks, each with distinct performance, reliability, and cost requirements. These networks are typically organized into four or five tiers, ranked below from lowest to highest by speed, performance demands, and connectivity needs. Because each network tier has different requirements, they use different cabling and hardware at varying price points. Within each
AI - The AI Supply Chain - AI Data Center Networks - Part 1 - History of Data Center Networks
The Critical Role of Networking in AI Beyond power and cooling, and beyond the specialized servers and AI accelerators themselves, one of the most essential, and often underestimated, components of any AI infrastructure is the network fabric that interconnects those systems. In NVIDIA’s AI Factory reference model, the network is not a supporting element; it is a core pillar that determines how efficiently AI workloads scale, communicate, and perform. Just as AI chips continue
AI in Security Operations Centers - Microsoft Defender
Security CoPilot - Reference Diagram Overview The component labeled “Security Copilot” functions primarily as an orchestrator that bridges the Microsoft environment with the OpenAI LLM operating within Microsoft’s secure ecosystem. In Microsoft Security Copilot, Copilots function primarily as orchestrators rather than traditional AI models using embeddings or vector databases. Instead of performing semantic searches or querying internal data stores, Copilots leverage plugins
AI in Security Operation Centers
Standard IR Data Analysis phases A practical way to evaluate AI’s impact on incident response (IR) is by examining how it enhances the data analysis phases that analysts perform during alert triage and incident handling. These are analytical stages, distinct from the traditional IR lifecycle of Identification, Containment, Eradication, Recovery, and Lessons Learned. The core data analysis phases include: Planning, Search (including Data Collection and Parsing), Normalization,
Microsoft Security Copilot for SOC Operations Test Plan
Test Plan - Test 1: Installation and Configuration of Microsoft Security Copilot and Applicable Plugins Background Microsoft Security Copilot leverages AI-driven orchestration across Microsoft security tools using integrated plugins and agents. Its performance depends on Security Compute Units (SCUs), the measure of compute capacity required to run Copilot workloads. SCUs are billed per hourly activation, not per-minute increments. Each activation incurs a minimum charge of o
Cyber Risk Concepts - CRISC certification notes - Part 4 - IT Systems
CRISC IT Systems Topic areas: Information Technology Principles Enterprise architecture: Managing and governing the overall structure of an organization's IT systems. IT operations management: Handling the day-to-day IT processes, such as change management, IT asset management, and incident management. Project management: Applying risk management principles throughout the system development life cycle (SDLC). Disaster recovery management (DRM): Creating and maintaining a plan
Cyber Risk Concepts - CRISC certification - Part 3 - Risk Monitoring & Reporting
Moving from Risk Assessment to Risk response & Reporting Once a risk has been identified and assessed, the next step is to ask: What will we do about it? This is where risk treatment or risk response comes into play, selecting the most appropriate action to manage the risk. Risk Response Risk and Control Ownership: Assigning accountability for risks and the controls that address them. Risk Treatment/Response Options: Deciding on the appropriate strategy for addressing ident
Cyber Risk Concepts - CRISC certification notes - Part 2 - Risk Assessment
Risk Evaluation & Risk Assessment Once the scope of the risk analysis is clearly defined, the next critical phase is Risk Assessment & Evaluation. This stage involves assessing the potential risks to the organization's people, assets, and data within the context of the defined system or environment. Risk Assessment & Evaluation serves as the analytical core of any cyber risk management process. While much of the industry content and discussion around cyber risk tends to focus
Cyber Risk Concepts - CRISC certification - Part 1 - Governance
CRISQ Topic area overview Cyber risk management often feels complex due to the variety of frameworks, terminology, and implementation approaches in circulation. This article serves as a study aid for the Certified in Risk and Information Systems Control (CRISC) certification by breaking down key concepts within a simplified, practical risk management framework. At a high level, effective risk management can be distilled into four core functions: Risk Governance – Define the m
AI - In Security Operation Centers - Microsoft Defender
Security Copilot Product Testing These concepts are presented to establish a foundation for evaluating what Security Copilot can do today, the effort required to implement those capabilities, and how that may evolve with future enhancements. For instance, the transition from the Planning phase to Data Search may not yet be fully dynamic, particularly when the data required for analysis originates outside the Microsoft ecosystem. Microsoft has long incorporated guided response
Microsoft Certs - SC-100 - Overview
The Microsoft SC-100 'Microsoft Certified: Cybersecurity Architect Expert' credential is a Microsoft expert level credential that...
Analyst Coverage of Cybersecurity Categories
Category Gartner (Magic Quadrant / Critical Capabilities) Forrester (Wave Reports) Identity & Access Management (IAM) ✅ Identity...
Identity Threat Concepts - Cookie Stealing Part 2 - KQL
broser extensions detections https://github.com/elastic/protections-artifacts/blob/b427449015fcbd81bbf2f0aa5f4dc800f64ccb96/behavior/rule...
Identity Threat Concepts - Cookie Stealing Part 1
Understanding Identity in Transit vs. Identity at Rest: The Session Hijack Problem This article breaks down a key issue in modern...
AI Chip Wars
I recently came across a post about the Netherlands passing a stricter espionage law, explicitly extending to cyber activities, and it...
Key Cybersecurity Metric Concepts
The Importance, and Challenge of Cybersecurity Metrics Metrics are foundational to driving and refining business processes, and...
AI cybersecurity from the ground up - Data Centers - Part 7 'Different Types of Data Centers & Neoclouds'
The Complexity of the AI Data Center Supply Chain At first glance, an AI service might appear to be delivered solely by a major cloud...
AI cybersecurity from the ground up - Data Centers - Part 3 'America's Superintelligence Project' gladstone.ai
Gladstone AI, an organization focused on mitigating national security threats from advanced AI systems, including weaponization and loss...
AI cybersecurity from the ground up - Data Centers - Part 5 'Data Center Cooling & Thermal Attacks'
While power is the foundation of any data center, cooling and thermal management are equally critical, especially in AI-intensive...























